IBM Terminology

This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.

C

C++An enhancement of the C language that adds features supporting object-oriented programming.

C++ languageAn object-oriented high-level language that evolved from the C language. C++ takes advantage of the benefits of object-oriented technology such as code modularity, portability, and reuse.

C++ libraryA system library that contains common C++ language subroutines for file access, memory allocation, and other functions.

C2A level of security defined in the Trusted Computer System Evaluation Criteria (TCSEC) published by the United States Government. To meet C2 requirements, a system must perform discretionary access control, authentication and verification, object reuse protection, and auditing of security-relevant events.

C/370 common anchor area (C-CAA)A common anchor area (CAA), specific to the C/370, in the runtime environment.

C5.0A rule induction algorithm that builds either a decision tree or a rule set. The model works by splitting the sample based on the field that provides the maximum information gain at each level. See also rule induction.

cable modemA modem that provides Internet access over cable TV networks (which use fiber-optic or coaxial cables). A cable modem is generally faster than a modem that uses phone lines.

cable pathA series of cables connected in sequence.

cable segmentA section of cable between components or devices on a network. A segment may consist of a single patch cable, multiple patch cables that are connected to one another, or a combination of building cable and patch cables that are connected to one another.

cable-throughPertaining to a function or feature of a display station that allows multiple work stations to be attached to one cable path.

To place, hide, or store frequently used information locally for quick retrieval.

To place a duplicate copy of a file on random access media when the server migrates a file to another storage pool in the hierarchy.

Storage or memory that is used to improve access times to instructions, data, or both. For example, data that resides in cache memory is normally a copy of data that resides elsewhere in slower, less expensive storage, such as on a disk or on another network node.

A buffer that contains frequently accessed instructions and data; it is used to reduce access time.

cache coherencyConsistency of data in caches on multiple processors so that changing a single cache line does not create inconsistent versions of the cache line in the different caches.

cached inventoryProducts that have their information, such as item attributes, inventory balance, or availability, stored in a local data cache. The consuming application, such as a web store, can access the information from the cache, reducing synchronous queries to the order management system.

cache evictionA process by which data associated with a file is removed from the cache system. The data is removed either by using a Least Recently Used (LRU) algorithm when configured General Parallel File System (GPFS) hard or soft quota limits are exceeded or by issuing a command. When referenced again in the cache system, the data that is associated with the file is retrieved from the home system.

cache fast writeA storage control capability in which data is written directly to cache without using nonvolatile storage. Cache fast write is useful for temporary data or data that is readily re-created. See also DASD fast write.

cache fileA snapshot of a logical volume created by Logical Volume Snapshot Agent. Blocks are saved immediately before they are modified during the image backup and their logical extents are saved in the cache files.

cache hit

A processor storage reference that is satisfied by information from a cache.

An event that satisfies a read operation by retrieving data from cache instead of retrieving it from the intended storage or a lower level of cache. See also cache miss.

A record that contains relevant information about the user data that is currently in the subsystem cache memory. Examples of this information include the current state of the data and the intended location of the data on one or more disks.

The cache component that is normally loaded, stored, and interrogated during cache lookup.

cache miss

An event that satisfies a read operation by retrieving data from the intended storage or a lower level of cache because the requested data is not available in the only level or a higher level of cache. See also cache hit.

A delay that occurs when the processor references data or instructions that are not already in the data cache or instruction cache.

cache replicationThe sharing of cache IDs, cache entries, and cache invalidations with other servers in the same replication domain.

cache setA storage-class parameter, defined in the base configuration information, that maps a logical name to cache structure names in a coupling facility (CF).

cache structureA coupling facility structure that stores data that can be available to all members of a Sysplex. A DB2 data sharing group uses cache structures as group buffer pools. See also group buffer pool.

cache tableIn a federated system, a logical table object that is used to cache data from a data source table. A cache table comprises a nickname that identifies the data source table, one or more materialized query tables, and a schedule for replicating the data in each materialized query table.

cache timeoutThe length of time that is allowed to pass before the cache is updated.

cachingThe process of storing frequently used results from a request to memory for quick retrieval, until it is time to refresh the information. The DB2 database manager provides many forms of caching, such as directory caching, package caching, file system caching, and LDAP caching.

caching I/O groupThe I/O group in the system that performs the cache function for a volume.

caching proxy serverA proxy server that stores the documents that it retrieves from other servers in a local cache. The caching proxy server can then respond to subsequent requests for these documents without retrieving them from the other servers. This can improve response time.

calculated categoryA category created based on a calculation. Calculated categories become part of the cube and can be applied to any measure.

calculated columnA column whose values are calculated from other columns, calculated columns, functions, and constants to derive new data for a model.

calculated expressionAn expression that is not constant, but whose value depends upon other values. To be evaluated, a calculated expression must obtain and compute values from other sources, normally in other fields or rows.

calculated measureA measure whose values are calculated from other measures, calculated measures, functions, and numeric constants in an arithmetic equation.

calculated memberA member of a dimension whose measure values are not stored but are calculated at run time using an expression. See also input member.

calculated metricA metric that can be defined using a formula that is constructed from one or more existing metrics, operators, or constants. For example, users can create a metric named Repeat Visitor % using a calculated metric of [(Unique Visitors –New Visitors)/Unique Visitors].

calculation

An equation within a database outline, a calculation script, or a report script that is used to determine a value for a particular member or point in a report.

The process used to transform a series of records into a new result. Typically a calculation is mathematical, but may also include sorting, shifting, or adding to a prior result. Calculations enable the model admin to select records from their source data, perform operations on the data, segment results, and begin another calculation based on those results.

calculation accountAn account used for calculating rations and formulas in reports. The abbreviation for calculation account is CALC account.

calculation codeA code associated with order items, catalog entries, or catalog groups to specify how discounts, shipping charges, sales or use taxes, and shipping taxes should be calculated.

calculation frameworkA flexible, generic framework provided by the WebSphere Commerce order subsystem, used to implement calculations and apply them to the applicable business objects.

calculation scaleA set of ranges that can be used by a calculation rule. For example, for shipping charges, there can be a set of weight ranges that each correspond to a particular cost. That is, a product that weighs between 0 to 5 kg might cost $10.00 to ship, while a product weighing 5 to 10 kg might cost $15.00 to ship.

calculation script (calc script)A text file that contains instructions for how specified data sets within a database should be calculated.

calculation specificationIn RPG, a specification on which the programmer describes the processing to be done by the program.

calculation strategyThe strategy used to calculate the final score of a scorecard table.

calculation usageA type of calculation that the calculation framework performs.

CalDAVAn Internet standard allowing a client to access scheduling information on a remote server. It extends the WebDAV (HTTP-based protocol for data manipulation) specification and uses iCalendar format for the data. The access protocol is defined by RFC 4791.

CalDAV accountA calendar that has been set up using CalDAV.

calendar

A list of scheduling dates. Calendars are defined in the database and are mostly assigned to run cycles. Calendars can be used either to identify the dates when job streams or jobs can be run (when used with inclusive run cycles), or when they cannot be run (when used with exclusive run cycles). A calendar can also be designated for use as a non-working days calendar in a job stream. See also exclusive run cycle, holidays calendar, iCalendar, inclusive run cycle, non-working days calendar, run cycle.

A view in the Notes mail database that can be used to manage time and schedule meetings. Users can add appointments, meetings, reminders, events, and anniversaries to the Calendar view.

calendar exceptionA partial or full day during which a resource does not work on a project

calendaringSoftware that provides users with the ability to schedule appointments and view contacts. Calendaring software generally works in accordance with other time management software and can be synchronized with additional devices (such as smartphones). See also synchronize.

calendar scheduleA schedule that defines both the days and time that processing occurs. For example, one could use a calendar schedule to make sure that a process runs every Tuesday starting between 19:00 and 19:30 and ending between midnight and 00:30.

calenderA process to make paper smooth or glossy by passing it through a series of metal rollers during the last steps of a paper-making machine.

In capacity planning, the process of refining a model so that it represents the system the user is modeling. The predicted and measured values should match as closely as possible, with no more than a 10% difference for resource utilization, and no more than a 20% difference for response times.

The comparison and adjustment of an instrument to a standard of known accuracy.

calibration driftThe difference between the as left value of the previous measurement compared to the as found value of the current measurement for an asset.

calibration pointThe calibration requirement for each asset function.

caliperThe thickness of forms, usually expressed in thousandths of an inch.

call

A physical or logical connection between one or more parties in a telephone call.

A single runtime instance of a voice application.

To start a program or procedure, usually by specifying the entry conditions and transferring control to an entry point.

callable interface

The application server to which the QMF session is currently connected. After the connection is made, this server processes all SQL statements.

The name of the interface program, the definition of the arguments passed to the interface program, and the definition of the data structures passed to the interface program.

In query management, the Common Programming Interface (CPI) that includes the definitions of the control blocks and constants used for the interface. See also command interface.

callable service

A set of documented interfaces between the z/OS operating system and higher level applications that want to access functions specified in the Single UNIX Specification and earlier standards. See also system call.

Services that are provided by IMS for use by IMS exit routines. These services provide clearly defined interfaces that allow exit routines to request various functions, such as acquiring storage or finding an IMS control block.

A program service provided through a programming interface. See also action service.

call-accepted packetA call supervision packet that a called data terminal equipment (DTE) transmits to indicate to the data circuit-terminating equipment (DCE) that it accepts the incoming call. See also call connected packet, call request packet.

call attachment facility (CAF)A DB2 for z/OS attachment facility for application programs that run in TSO or z/OS batch. The CAF is an alternative to the DSN command processor and provides greater control over the execution environment. See also Resource Recovery Services attachment facility.

call backTo invoke a callback or upcall.

callback

In the AIX operating system, a procedure that is called if and when certain specified conditions are met.

Pertaining to a characteristic that tells a remote system whether the local system it tries to access will verify its identity.

A way for one thread to notify another application thread that an event has happened.

A message consumer or an event handler routine.

callback functionExecutable code that allows a lower-level software layer to call a function defined in a higher-level layer.

callback handlerA mechanism that uses a Java Authentication and Authorization Service (JAAS) interface to pass a security token to the web service security run time for propagation in the web service security header.

callback mechanismA method for authentication of a voice user who is requesting a system API. This mechanism places a callback request to VoiceLogistics Pro (VLP) to verify whether the user is logged into VLP.

callback registrationThe identification and registration of a callback routine.

callback routineA procedure that is called if and when certain specified conditions are met. This is accomplished by specifying the procedure in a callback list.

callback URLA URL that is supplied in a call to an API method. The API will call that URL, usually when the API has finished its task.

call center

A central point at which all inbound calls are handled by a group of individuals on a controlled sequential basis. Call centers are usually a front end to a business such as airline ticketing or mail order.

A center that handles a large number of calls to either take orders or provide customer service.

call center dashboardA user interface that provides information on how the telesales service representative, shift, or call center is performing.

call chainA trace of all active routines and subroutines, such as the names of routines and the locations of save areas, that can be constructed from information included in a system dump.

call connected packetIn X.25 communications, a call supervision packet transmitted by a DCE to inform the calling DTE of the complete establishment of the call. See also call request packet, call-accepted packet.

call controlThat set of telephony functions that includes call establishment, call transfer, and call disconnection (the program control of a telephone call).

call detailA list of calls made or received on a device and plan.

call detail record (CDR)In telephony, a unit of information containing data about a completed call, such as the time the call began, its duration and date, the originating extension, and the number called.

called DLS userThe data link service (DLS) user in connection mode that processes requests for connections from other DLS users. See also Data Link Service.

called NS userA network service (NS) with which a calling NS user wants to establish a network connection.

Any person, device, or system that receives a telephone call. See also caller.

On a switched line, the location to which a connection is established.

called programA program that is the object of a CALL statement combined at run time with the calling program to produce a run unit.

called routineA program or sequence of instructions that is invoked by another program.

called segmentA segment that is called from another segment. It can be regarded as an extension of the calling segment, but some actions take place at the call and others at the return. Examples of actions are saving the addresses of the current position and the next order on the segment call stack at the call, and restoring those saved addressed at the return.

caller

The requester of a service.

A function that calls another function.

Any person, device, or system that makes a telephone call. See also called party.

caller IDA feature that displays the phone number of the incoming caller.

call establishmentThe complete sequence of events that is necessary to establish a data connection.

call forwardTo send an incoming call to a different number.

call forwardingThe process of sending incoming calls to a different number.

callgateA method for CSM code to request that an agent function is executed. The callgate request contains the function, along with an instruction on which nodes should execute the function. For example, a CSM callgate could request that the agent code checks a user privilege level, and that would only be executed on the active configuration node.

call graphA graph that uses lines represents the flow of data between subroutines in a program.

call holdA feature that places callers on hold while the user does something else (or answers another call).

call homeA communication link established between a product and a service provider. The product can use this link to place a call to IBM or to another service provider when it requires service. With access to the machine, service personnel can perform service tasks, such as viewing error and problem logs or initiating trace and dump retrievals.

CALLINThe logical channel type on which the data terminal equipment (DTE) can receive a call, but cannot send one.

callingIn X.25 communications, pertaining to the location or user that makes a call.

calling line identification presentation (CLIP)An ISDN supplementary service that advises the called party of the caller's number: for example, by displaying it on a telephone display panel.

calling partyOn a switched line, the location that originates a connection.

calling programA program that calls another program.

calling threadThe task in progress in a multitasking environment.

call interceptA feature that prevents a call from being answered under certain conditions; for example, when the caller's phone number is invalid or unrecognized.

CALL interfaceA part of the external CICS interface (EXCI). The CALL interface consists of six commands that allow you to allocate and open sessions to a CICS system from non-CICS programs running under MVS; issue DPL requests on these sessions from the non-CICS programs; and close and deallocate the sessions on completion of the DPL requests.

CALLIOThe logical channel type on which the data terminal equipment (DTE) can send or receive a call.

call levelThe position of an entry (program or procedure) in the call stack. The first entry has a call level of 1. Any entry called by a level 1 entry has a call level of 2, and so on.

call level interface (CLI)

An API for database access that provides a standard set of functions to process SQL statements, XQuery expressions, and related services at run time. See also embedded SQL.

A callable application programming interface (API) for database access, which is an alternative to using embedded SQL.

call level numberA unique number assigned by the system to each call stack entry.

call mergingA feature that allows a user who is on a call to accept a second call and merge it into the first, converting the two separate calls into a multi-person conference.

call message queueA message queue that exists for each call stack entry within a job.

CALLOUTThe logical channel type on which the data terminal equipment (DTE) can send a call, but cannot receive one.

callout

A kernel parameter that establishes the maximum number of scheduled activities that can be pending simultaneously.

An outbound message to request services or data from an enterprise application or web service.

The action of bringing a computer program, a routine, or a subroutine into effect.

callout nodeThe connection point in a mediation request flow from which a service message is sent to a target. There must be one callout node for each target operation.

callout response nodeThe starting point for a mediation response flow. There must be one callout response node for each target.

callout tableA kernel table that keeps track of all sleeping processes and the channel on which each is waiting.

call profileIn telephony, a set of characteristics that may be used when establishing or manipulating a program-controlled telephone call.

call progress signalA call control signal transmitted from the data circuit-terminating equipment (DCE) to the calling data terminal equipment (DTE) to indicate the progress of the establishment of a call, the reason why the connection could not be established, or any other network condition.

call redirection notificationIn X.25 communications, an optional CCITT-specified facility that informs the caller that the call has been redirected to another DTE.

call request packetA call supervision packet that a data terminal equipment (DTE) transmits to ask that a connection for a call be established throughout the network. See also call connected packet, call-accepted packet.

call request signalDuring the establishment of a connection for a call, a signal that informs the data circuit-terminating equipment (DCE) that a data terminal equipment (DTE) has asked to make a call.

call sessionThe sequence of events that occurs from the time a call is initiated to the time all activities related to answering and processing the call are completed.

call stack

A list of data elements that is constructed and maintained by the Java virtual machine (JVM) for a program to successfully call and return from a method.

The ordered list of all programs or procedures currently started for a job. The programs and procedures can be started explicitly with the CALL instruction, or implicitly from some other event.

call stack entryA program or procedure in the call stack.

call supervision packetA packet used to establish or clear a call at the interface between the data terminal equipment (DTE) and the data circuit-terminating equipment (DCE).

call threadIn the Distributed Computing Environment (DCE), a thread created by a remote procedure call (RPC) server's run time to execute remote procedures. When engaged by an RPC, a call thread temporarily forms part of the RPC thread of the call.

call transferA series of actions that directs a call to another telephone number.

call user data (CUD)User-specified data that can be placed in an X.25 call request packet to be sent to the adjacent node.

camera-ready copyCopy which is ready for photographic typesetting.

campaignA planned series of operations including advertisements and suggestive selling techniques, that are pursued to achieve a defined set of business objectives. In the WebSphere Commerce Accelerator, campaigns are used to coordinate and aggregate groups of campaign initiatives.

Canadian Standards Association (CSA)A not-for-profit membership-based association dedicated to standards development for business, industry, government and consumers in Canada and the global marketplace. See also CSA International.

cancelTo end a task before it is completed.

cancelability pointA specific point within the current thread that is enabled to solicit cancel requests.

cancel closedownA closedown in which a program is abnormally terminated either because of an unexpected situation or as the result of an operator command. See also orderly closedown, quick closedown.

cancellation cleanup handlerA function that you can specify to perform an action, such as releasing resources, that occurs after the thread returns from the start routine and calls pthread_exit() or after a cancellation request is performed on the thread.

cancellation pointA function that causes a pending cancellation request to be delivered if the cancellation state is enabled and the cancellation type is deferred.

cancellation stateOne of two values, which are either enabled or disabled, that describe whether cancellation requests in the current thread are acted on or held in a pending state. If the value is enabled, the cancellation request is acted on immediately and is based on the current cancellation type. If the value is disabled, the cancellation request is held in a pending state until it is enabled.

cancellation typeOne of two values (deferred or asynchronous) that describe how cancellation requests in the current thread are acted on when the cancellation state is enabled. If the value is deferred, the cancellation request is held pending. If the value is asynchronous, the cancel request is acted on immediately, thus ending the thread with a status of PTHREAD_CANCELED.

candidate

An individual who has applied to requisition. A candidate must have expressed an interest in the position using electronic means, must be considered by the potential employer, must have the basic qualifications for the job, and cannot withdraw before an offer is made. Unless a candidate meets each criterion, that candidate is not an internet applicant for record-keeping purposes.

An applicant profile that has been submitted in response to either a contingent staff or hybrid request.

candidate answerAn answer that is generated by the system which is evaluated for correctness and might be returned as the correct answer.

candidate columnA column that is used as a placeholder in a mapping.

candidate endpointA known service endpoint that implements an interface for a particular request. The set of candidates is then filtered by the dynamic assembler to select the best endpoint out of all the candidates.

candidate formAn electronic document that captures the full set of candidate data.

candidate form associationThe field bindings that allow a user to designate which field values drive (pre-populate) other field values.

candidate listA short list of entities that are potential matches of the incoming identity because they share certain attributes. See also attribute.

candidate scoreA score based on the comparison of information in a candidate's resume to the job description. The score can be 1 to 1,000. The score can be used as a starting point in a search for qualified candidates, but is not a final indicator of qualifications.

candidate termA term in a business glossary that is being considered but that has not yet become standard or accepted. See also accepted term, standard term.

candidate thresholdThe minimum score at which a particular attribute value must match between the incoming identity and an existing entity to satisfy the resolution rule. See also resolution rule.

cannibalizationA process that uses a working component from an asset that is not in service, and replaces a broken component on an asset that is in service.

canonical addressIn LANs, the IEEE 802.1 format for the transmission of medium access control (MAC) addresses for token-ring and Ethernet adapters. In canonical format, the least significant (rightmost) bit of each address byte is transmitted first. See also noncanonical address.

canonical formatA format for storing hierarchical names that displays the hierarchical attribute of each component of the name. For example, the canonical format for the name Reuben D. Smith/Ottawa/Renovations/CA is: CN=Reuben D. Smith/OU=Ottawa/O=Renovations/C=CA where: CN is the common name, OU is the organizational unit, O is the organization, and C is the region or country code.

canonical host nameA host name that is not an alias.

canonicalizationIn computer science, a process that converts data with more than one possible representation to a standard, or canonical, form.

A group of functions and features that can be hidden or revealed to simplify the user interface. Capabilities can be enabled or disabled by changing preference settings, or they can be controlled through an administration interface.

A function or feature that is made available by an application, tool, or product.

Specific features or characteristics of a piece of software, such as the database version.

capability dataIn OSI, a confirmed data transfer service provided by the session layer to transfer a limited amount of data outside of an activity. Capability data can be used by two peers to exchange information about their capability to start an activity.

capability exchangeA series of messages that pass between two CICS regions to establish if they can communicate using IP interconnectivity (IPIC). The capability exchange determines the security controls that are applied to the connection, the number of sessions to be made available, and resynchronizes any outstanding work if the connection has previously failed.

capability listA list of associated resources and their corresponding privileges per user.

capability matrixA data structure that represents the linguistic capabilities available within multiple language dictionaries, and allows searching for appropriate dictionaries.

capability typeA category, such as "database" or "hardware" that is used to group characteristics of a piece of software. For example, the "hardware" capability type includes characteristics such the BIOS vendor and BIOS version.

capable to promise (CTP)Pertaining to the ability to fill and deliver an order in a specific time frame.

capacitorAn electronic part that permits storage of electricity.

capacity

A measure of how much volume or revenue can be handled by a specific resource.

The actual number of parallel servers and workstation resources available during a specified open interval.

capacity breakIn logistics, a level of shipment size at which the cost changes.

capacity ceilingThe maximum number of operations that a workstation can handle simultaneously.

capacity constraintA rule that governs the amount of items that can be awarded to a supplier. Using a capacity constraint, business can be awarded to a preferred supplier or the volume of business for a supplier can be limited.

capacity licensingA licensing model that licenses features with a price-per-terabyte model. Licensed features are FlashCopy, and Metro Mirror and Global Mirror, and virtualization. See also FlashCopy, Metro Mirror, virtualization.

capacity on demand (CoD)The ability of a computing system to increase or decrease its performance capacity as needed to meet fluctuations in demand.

capacity organizationAn organization definition for which all resource capacity information is consolidated.

capacity overrideOverride of typical capacity plans when additional capacity is required for specific date/time slot combinations to handle planned spikes in demand or shortfalls in resources.

capacity plannerA function that uses information about the system, such as a description of the system's workload, performance objectives, and configuration, to determine how the data processing needs of the system can best be met. The capacity planner then recommends, through the use of printed reports and graphs, ways to enhance performance, such as hardware upgrades, performance tuning, or system configuration changes.

capacity planning

The process of determining the hardware and software configuration that is required to accommodate the anticipated workload on a system.

The process of scheduling the resources required to perform project work.

capacity requirements planning (CRP)The process of specifying the level of resources (facilities, equipment, and labor force size) that best supports the competitive strategy for production of the enterprise.

Capacity Upgrade on Demand (CUoD)The capability to permanently activate one or more inactive processors without having to restart the server or interrupt the data flow of the business, through the purchase of a permanent processor activation. This capability adds significant value by enabling a fast and economical way to add capacity for new workloads, enabling the server to adapt to unexpected performance demands. See also activation code, application provisioning, dynamic LPAR, free pool, Hardware Management Console.

capital lock (caps lock)The keyboard function that invokes the uppercase of alphabetic characters, but does not change the response of numeric and other keys. This function is convenient for combining uppercase letters with numbers as in the string “M3C 1H7”. Capital Lock is a toggle key.

capitals lock stateA state that, if activated, will result in the generation of the capital form of all graphic characters on the keyboard for which such a form exists. National standards or usage may determine which graphic characters are affected by this state (see ISO/IEC 9995-1).

cap-M heightThe average height of the uppercase characters in a font. This value is specified by the designer of a font and is usually the height of the uppercase M.

A description associated with an identifier. The caption is often used in preference to the identifier in reports to make them more comprehensible.

A National Language Support-enabled text string in a policy expression that describes the policy.

Text associated with, and describing, a table or figure.

capture

The process by which some printers can save downloaded fonts as temporary printer-resident fonts.

The process by which an acquirer receives payment from the customer's financial institution and remits the payment. A "capture" is the guarantee that the funds are available and that the transfer will take place.

In SQL replication, event publishing, and Q replication, to gather changes from a source database. These changes can come from the DB2 log or journal or from source transactions in a relational database that is not a DB2 database.

To digitize an image into the video memory of the M-Video Capture Adapter.

Capture control serverIn SQL replication, a database or subsystem that contains the Capture control tables, which store information about registered replication source tables. The Capture program runs on the Capture control server.

capture dataThe business information collected by CICS for inclusion in an event.

captured UCBA virtual window into the actual unit control block (UCB). Captured UCB resides in private storage below 16 MB. All the virtual windows on the actual UCB view the same data at the same time. Only actual UCBs above 16 MB are captured. See also actual UCB, unit control block.

capture fileA file used by a communication program to capture, or record, data being transmitted from a remote system or device.

Capture latencyIn SQL replication, an approximate difference between the time that source data was changed and the time that the Capture program made the data available to the Apply program by committing the data to a CD table. Capture latency is a subset of the end-to-end latency in a replication configuration. See also Apply latency, end-to-end latency, latency, Q Apply latency, Q Capture latency.

capture pointA point in application logic or CICS system activity where an event is generated. Capture points are defined in a capture specification.

Capture programIn SQL replication, a program that reads database log or journal records to capture changes that are made to DB2 database source tables and store them in staging tables. See also Apply program, Capture trigger, Q Capture program.

Capture schemaIn SQL replication, a name that identifies the control tables that are used by an instance of the Capture program.

capture specificationA capture specification provides the information that CICS will use to detect an event within an application or in the system. The capture specification can include the capture point, capture data, and predicates for filtering and is defined in the event binding file.

capture streamThe flow of hits (request/response combinations) through a system.

capture to fileTo save data into a file.

Capture triggerIn SQL replication, a mechanism that captures delete, update, or insert operations that are performed on source tables other than DB2 source tables. See also Apply program, Capture program.

carbon capA limit on carbon emissions.

carbon copyA process that allows a shipper to generate a copy of an outbound data exchange transaction, which is sent to other organizations.

carbon creditA transferrable permit that allows an organization to release one ton of carbon dioxide into the environment. The implementation of carbon credits is an attempt to reduce the amount of greenhouse gases that are being produced.

carbon emission sinkCarbon that is sequestered in forestry management, agricultural management, and other land management.

carbon footprintThe amount of greenhouse gas that a person or organization is responsible for producing. A smaller carbon footprint is associated with having less detrimental effect on the environment.

Carbon Responsibility Factor (CRF)The percentage of a vehicle's carbon emissions that are attributable to the supply chain.

card

In the Map Designer, a data object. There are two types of map cards: input and output.

A record of information attached to an item. An item can have multiple cards.

An electronic circuit board that is plugged into a slot in a system to give it added capabilities.

A Wireless Markup Language (WML) document that provides user-interface and navigational settings to display content on mobile devices. See also deck.

card columnThe column from a punch card that was used in early computers to read information. Punch cards typically contained 80 columns of 12 rows.

Card Distributed Authoring and Versioning protocol (CardDAV)An address book client or server protocol designed to allow users to access and share contact data on a server. The CardDAV protocol was developed by the IETF and was published as RFC 6352 in August 2011. CardDAV is based on WebDAV, which is based on HTTP, and it uses vCard for contact data.

card enclosureThe area in the system that contains the logic cards.

card imageA one-to-one representation of the hole patterns of a punched card; for example, a card image might be a matrix in which a one represents a punch and a zero represents the absence of a punch.

cardinality

The number of rows in a database table or the number of elements in an array. See also associative array.

In information analysis, a measure of the number of unique values in a column.

For OLAP data sources, the number of members in a hierarchy. The cardinality property for a hierarchy is used to assign solve orders to expressions.

The number of elements in a set.

For relational data sources, a numerical indication of the relationship between two query subjects, query items, or other model objects.

card objectAn object used in the TX Programming Interface that represents an input or output card of a map in program memory.

Card Serial Number (CSN)A unique data item that identifies a hybrid smart card. It has no relation to the certificates installed in the smart card.

care management platformA software platform that is used to manage care across the care continuum. It can identify clients in need of care, assess their needs, establish the appropriate care plan to support their needs, and manage the care and monitor results and outcomes.

The action that indicates that printing is to be continued at the left margin of the next line. A carriage return is equivalent to the carriage return of a typewriter.

The movement of the printing position or display position to the first position on the same line.

A keystroke generally indicating the end of a command line.

carriage return characterA character that in the output stream indicates that printing should start at the beginning of the same physical line in which the carriage-return character occurred.

carrier

A transportation service provider that provides delivery and shipping services between buyers, sellers, and customers.

A service provider that provides the telecom services to customers.

A continuous frequency (a pulse train, or an electric or electromagnetic wave) that may be varied by a signal bearing information to be transmitted over a communication system.

The backing material for labels. Labels consist of the printable medium, the adhesive, and the carrier.

carrier holeOne of many holes in the side margins on continuous-forms paper. When placed on the tractor pins, the holes maintain paper alignment and registration, and control the movement of the paper.

carrier IDA code that identifies a carrier organization in regions outside North America, which do not use a SCAC as an identifier. See also Standard Carrier Alpha Code.

carrier management systemA network management product that a communication common carrier provides to a customer; this product monitors and manages the telecommunication equipment that the communication common carrier provides for the customer's network.

carrier PRO numberA reference number that the carrier can assign to each shipment.

carrier senseIn a local area network, an ongoing activity of a data station to detect whether another station is transmitting.

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)An arbitration protocol in which multiple stations access the network without explicit coordination, avoiding contention by checking for other signals (sensing the carrier) and deferring if a signal is already present. Should two signals collide, each station detects the collision and transmits again after a random amount of time.

carrier service capacityThe unit of measure that is maintained for a carrier service item. For example, the unit of measure could be defined as truck space for delivery items.

carrier signalA signal with a constant frequency that can be modulated to carry a data signal.

cart bar codeA number or bar code stuck on a cart that is used to identify a specific cart.

Cartesian productThe resulting set from performing a multiple-table query without any specified joining conditions among the tables.

cartonA standard container with specific dimensions used in both storage and shipping of loose items.

carton flow rackStorage rack consisting of multiple lanes of gravity fed carton flow conveyors. The lanes are replenished from the rear. The material flows through the rack and is picked from the front.

cartonizationThe process by which loose items from a common order or common customer are placed in standard cartons in preparation for shipment.

carton manifestThe list of cartons in a parcel carrier shipment.

cartridge ejectFor an IBM TotalStorage Enterprise Automated Tape Library 3494, IBM 3495 Tape Library Dataserver, or a manual tape library, the act of physically removing a tape cartridge, usually under robot control, by placing it in an output station. The software logically removes the cartridge by deleting or updating the tape volume record in the tape configuration database (TCDB). For a manual tape library, cartridge eject is the logical removal of a tape cartridge from the manual tape library by deleting or updating the tape volume record in the TCDB.

cartridge entryFor an IBM TotalStorage Enterprise Automated Tape Library 3494, IBM 3495 Tape Library Dataserver, or a manual tape library, the process of logically adding a tape cartridge to the library by creating or updating the tape volume record in the tape configuration database (TCDB). The cartridge entry process includes the assignment of the cartridge to the scratch or private category in the library.

cartridge loaderA feature that allows a user to place tape cartridges in a loading rack for automatic loading. Manual loading of single tape cartridges is also possible.

To connect in a series or in a succession of stages so that each stage derives from or acts upon the product of the preceding stage. For instance, network controllers might be cascaded in a succession of levels in order to concentrate many more lines than a single level permits.

In AIX, to arrange in a series.

An operation that propagates the exact same operation to all dependant objects.

In certain printers, the layout of procedure windows on the operator console. Each new procedure window overlays the previous one, with only the previous window's title bar in view.

cascade deleteA process by which the DB2 database manager enforces referential constraints by deleting all descendent rows of a deleted parent row.

cascaded initiatorAn intermediate node in a transaction program network that uses the two-phase commit protocol.

cascaded transactionA transaction that spans nodes and is coordinated by Resource Recovery Services (RRS). cascaded multisystem transaction. A transaction that spans systems in a sysplex and is coordinated by Resource Recovery Services (RRS).

cascaded UR familyA collection of nodes consisting of a unit of recovery (UR) and its descendants.

cascading choiceA choice on a menu that, when selected, presents another menu with additional related choices.

cascading deleteThe process of deleting rows from a child table when the foreign key is deleted from the parent table. When any rows are deleted from the primary key column of a table, cascading deletes, if enabled, delete identical information from any foreign-key column in a related table.

cascading menuA submenu of related choices that is invoked when the parent item is selected.

cascading permissionA permission of a parent folder in the content repository that has been propagated to its child objects.

cascading promptA prompt that uses values from a previous prompt to filter the values in the current prompt or pick list.

cascading replicationA replication topology in which there are multiple tiers of servers. A peer/master server replicates to a small set of read-only servers which in turn replicate to other servers. Such a topology off-loads replication work from the master servers.

cascading resourceA resource that can be taken over by more than one node. A takeover priority is assigned to each configured cluster resource group on a per-node basis. In the event of a takeover, the node with the highest priority acquires the resource group. If that node is unavailable, the node with the next-highest priority acquires the resource group, and so on.

Cascading Style Sheets (CSS)A language that defines a hierarchical set of style rules for controlling the rendering of HTML or XML files in browsers, viewers, or in print.

Cascading Style Sheets positioning (CSS-P)Use of Cascading Style Sheets to position web page elements using pixel locations or locations relative to other elements.

cascading switchesSwitches that are interconnected to build large fabrics.

case

A group of related activities that address a specific business situation. The user or predefined conditions, instead of a defined flow, determines the sequence in which activities are performed. See also business process definition, case type.

A container that holds a specified quantity of identical items (SKU) as packaged by a vendor. Cases are identified by license plate number and are generally put away into storage, in their original condition until picked.

The basic unit of analysis. In a data set based on a simple survey, a case generally corresponds to a respondent.

The information that is contained within a database that pertains to a particular investigation.

case IDA unique identifier for a case or carton stored in the warehouse.

case label

In Pascal, a value or range of values that comes before a statement in a CASE statement branch. When the selector is evaluated to the value of a CASE label, the statement following the case label is processed.

The word case followed by a constant expression and a colon. When the selector is evaluated to the value of the constant expression, the statements following the case label are processed.

case sensitivePertaining to the ability to distinguish between uppercase and lowercase letters.

case-sensitive searchA search in which a result will be found for the search string only if the particular combination of uppercase and lowercase letters are exactly matched.

case statusA label that is applied to a case by the Data Collection system that indicates its current level of completion.

case typeThe definition of the activities that must be completed to address a specific type of business situation. For each activity, the case type specifies the document types that are required to support the activity, the user interface in the activity, and the teams that must complete the activity. Case types make up a case. See also case.

cash-and-carryA delivery method by which orders are fulfilled directly from a store and paid in full at the time of transaction. Cash-and-carry transactions require no additional processing.

cashbackA service that provides customers with the ability to receive cash in addition to the goods that they purchased in a store using an alternate payment method. The total amount of the transaction, which includes the cost of the purchased goods and the amount of the cash received, is debited from the customer's account. For example, a customer might charge $37 to their credit card for a $17 item in order to get that item and $20 back from the store.

CA-signed certificateA certificate that is signed using a key maintained by a certificate authority. Before issuing a certificate, the certificate authority evaluates a certificate requestor to determine that the requestor is the certificate holder referenced in the certificate.

A database object and an operator for converting data from one data type to another. Built-in data types have built-in casts to compatible data types within database server. See also explicit cast, implicit cast, user-defined cast.

In programming languages, an expression that converts the value of its operand to a specified type.

cast expressionAn expression that converts or reinterprets its operand.

cast functionA function that is used to convert instances of a source data type into instances of a different target data type. In general, a cast function has the name of the target data type and has one single argument whose type is the source data type. Its return type is the target data type.

castingConverting a value with a given data type to a different data type or to the same data type with a different length, precision or scale. See also downcasting, upcasting.

A container that, depending on the container type, holds processes, data, resources, organizations, or reports in the project tree.

A collection of services.

A data set that contains information about other data sets.

A repository for storing specifications for builds, reference structures, connections, and other components.

A selection of wireless devices and plans that are configured in the application and made available for purchase.

A container that stores items. An item can belong to only one catalog. Each catalog must be associated with at least one hierarchy, the primary hierarchy, and can be associated with one or more secondary hierarchies. See also item.

A container for one or more offerings that a user can request.

A collection of tables and views that contains descriptions of objects such as tables, views, and indexes.

To specify the record class and file plan location when declaring a record.

A collection of apps.

A directory of files and libraries, with reference to their locations.

catalog cleanupA process that deletes entries for which volumes are no longer available; catalog cleanup also allows deletion of a catalog even though it is not empty.

catalog connectorA catalog entry, either a user catalog entry or a catalog connector entry, in the master catalog that points to a user catalog's volume (that is, it contains the volume serial number of the direct access volume that contains the user catalog).

cataloged data setA data set that is represented in an index or hierarchy of indexes that provide the means for locating it.

cataloged procedureA set of job control language (JCL) statements that has been placed in a library and that is retrievable by name.

catalog entryAn object in an online catalog. An entry has a name, description, list price, and other details. The entry can be as simple as a SKU; it may also be a product that is automatically broken down into its component items such as a bundle or package. See also list price.

catalog filterA filter that controls product entitlement by dividing catalogs into subsets as defined by the business owner. Catalog filters can also be used as one of the price rules conditions when determining the prices for the set of catalog entries that a set of customers are entitled to.

Catalog Filter and Pricing toolA Management Center feature that is used to create and manage catalog filters, price lists, and price rules.

catalog groupA collection of one or more catalog entries or catalog groups which create a navigational hierarchy for an online catalog.

catalog indexA searchable index file that is built from the item data in an order management database. This index provides fast search capability on catalog items.

catalog memberThe member in an installation that acts as an index to the information stored in the container server members and supports the data grid.

catalog organizationAn organization definition for which an item master is defined.

catalog partitionIn a partitioned database environment, the database partition where the catalog tables for the database are stored. Each database in a partitioned database environment can have its catalog partition on a different database partition server. The catalog partition for a database is automatically created on the database partition server where the CREATE DATABASE command is run.

catalog recovery area (CRA)An entry-sequenced data set (ESDS) that exists on each volume owned by a recoverable catalog, including the volume on which the catalog resides. The CRA contains copies of the catalog's records and can be used to recover a damaged catalog.

catalog requestOne or more offerings that have been ordered by a service requester. Catalog requests are fulfilled via the activities of the Service Catalog approval workflow.

catalog ruleA rule that pertains to catalog management.

Catalog Search InterfaceIn z/OS, a particular application programming interface (API) that allows programs written in assembler or a high-level language to read information from a catalog.

catalog serverOne of the four member types in an installation, the catalog server member acts as an index to the information stored in the container server members and supports the data grid.

catalog serviceA service that controls placement of shards and discovers and monitors the health of containers.

catalog service domainA highly available collection of catalog service processes.

catalog tableA table that is automatically created in the DB2 database catalog when a database is created. Catalog tables contain information about a database and its objects. See also catalog view.

catalog view

In DB2 for Linux, UNIX, and Windows, a SYSCAT or SYSSTAT view on the catalog table.

One of a set of views automatically created when a database is created. Catalog views contain information about the database and the objects in that database. Examples of information about the database are definitions of database objects and information about the authority that users have on these objects. See also catalog table.

catch blockA block associated with a try block that receives control when an exception matching its argument is thrown. See also try block.

catcherA server that service personnel use to collect and retain status data that other machines, such as the TotalStorage Enterprise Storage Server (ESS), send to it. See also catcher telephone number.

catching message intermediate eventAn intermediate event that is triggered when a specific message is received. See also intermediate event.

catch-upIn a remote journal network, the process of replicating journal entries that existed in the journal receivers of the source journal before the remote journal was activated.

catch-up mountA local mount that z/OS UNIX automatically issues to every other system's physical file system that is running sysplex-aware for that mode (read-write or read-only) when a file system mount is successful on a system in a shared file system environment.

catch-up processingIn an RSR environment, the process by which tracked log data is used to make all recoverable resources (for example, shadow databases) current with those resources on the active IMS.

catchup stateIn high availability disaster recovery, a state in which the standby database might not have applied all logged operations that occurred on the primary database. In this state, the standby database retrieves and applies previously generated log data to synchronize with the primary database. There are two types of catchup states: local and remote.

categorical questionA question that has a limited number of categories with a choice of possible answers. Categorical questions can be single response or multiple response.

categorical responseA response that has a limited number of categories that represent the possible responses. Categorical responses can be single response or multiple response.

categorical variableA variable that has a limited number of distinct values or categories, such as a variable that is based on a question that has a predefined set of answers. Categorical variables can be single response or multiple response.

category

A classification of elements for documentation or analyses.

A property that is set on an element of the business object model (BOM) and can be applied to business classes and filtered in business rules. This property allows the user to specify whether a business class and its members are visible in a rule.

One possible answer in a set of answers that are defined in the category list of a categorical or grid question.

A group within a system of classification whose contents share similar properties. See also category page.

A set of catalog items in a number of different hierarchical and searchable groupings.

A container that groups a set of related records within a file plan.

A container used in a structure diagram to group elements based on a shared attribute or quality.

An optional grouping of messages that are related in some way. For example, messages that relate to a particular application might be included in a single category. See also message.

A word, phrase, or number used to group documents in a view.

A type class that is used to organize types in a type tree in the Type Designer. Categories organize types that have common properties.

A closed-ended response to a question or item in a shared list.

A set of items that are grouped according to a specific description or classification. Categories can be different levels of information within a dimension. See also member.

A classification of an item. Hierarchies are made up of categories and items. Items in a catalog can be associated to one or more categories from the specifications of the catalog. Items can also be unassigned, which is their default state, which means they are not in any category yet. Every hierarchy has exactly one root category. Every category can have any number of additional categories within it, called sub-categories. See also container, hierarchy.

A logical subset of volumes in a tape library. A category can be assigned by the library manager (for example, the insert category) or by the software (such as, the private or scratch categories).

The recommended security specifications needed for both the CICS transaction definitions and the corresponding RACF profiles.

A word or phrase that classifies and organizes terms in the business glossary. A category can contain other categories, and it can also contain terms. In addition, a category can reference terms that it does not contain. See also business glossary.

category 1 transactionA set of CICS transactions categorized according to the level of security checking required for them. Transactions in this category are never associated with a terminal: that is, they are for CICS internal use only and should not be invoked from a user terminal. For this reason, CICS does not perform any security checks when it initiates transactions in this category for its own use.

category 2 transactionA set of CICS transactions categorized according to the level of security checking required for them. Transactions in this category are either initiated by the terminal user or are associated with a terminal. You should restrict authorization to initiate these transactions to user IDs belonging to specific RACF groups.

category 3 transactionA set of CICS transactions categorized according to the level of security checking required for them. Transactions in this category are either invoked by the terminal user or associated with a terminal. All CICS users, whether they are signed on or not, require access to transactions in this category. For this reason, they are exempt from any security checks and CICS permits any terminal user to initiate these transactions. Examples of category 3 transactions are CESN and CESF, to sign on and off, respectively.

category attributeAn attribute instance on a category. The attribute is defined in the specification of the owning hierarchy or by a secondary specification associated to that category. See also attribute instance.

category bagA container for keyed reference pairs used to aid discovery of a published web service. Each category bag includes a name and the value of a category to which the published item belongs.

category codeA value that uniquely identifies every category within a dimension. See also member unique name.

category countA measure that records the number of unique, non-zero and non-missing values for the categories in the dimension and level specified by the user.

category distributionThe placement of categories among the columns of a category list that is displayed in more than one column or row.

category fieldAn additional field that is created by a buyer user to gather more information about categories and items. A category property is specific to the category for which it is created and applies only to items of that category.

category filterA filter that is set on a business rule and removes the business element to which a category was attached from the completion menu.

category listA list of predefined answers that are in a categorical or grid question. The respondent selects the answers to the question from this list. For example, a list of brand names is a category list.

category pageA web page in an online store that displays product categories. Category pages connect customers to child category pages or to products that belong to the selected category. See also category, child category.

category recommendationA recommendation based on the category of a target product.

category replicationThe answer portion of categorical, grid, and numeric grid Looks. The category replication controls which category rows in a Look are repeated when the Look is applied to a question.

category schemaA reusable group of categories and subcategories. Assets can be organized in repositories according to their category schemas.

category setA subset of the categories in a dimension, either from a single level or from different levels in the same dimension. See also set.

category-specific item attributeAn attribute instance that applies to an item because of the presence of that item in a given category. A secondary specification with additional attributes is applied to that category, and all items in that category gain those extra fields. See also attribute instance.

CEEDUMPA dump of the run-time environment for Language Environment and the member language libraries. Sections of the dump are selectively included, depending on options specified on the dump invocation. This is not a dump of the full address space, but a dump of storage and control blocks that Language Environment and its members control.

A logical grouping of users, computers, data, and other resources that share either a common purpose or a common level of trust.

One or more processes that each host runtime components. Each has one or more named core groups.

A single cartridge location within an Automated Tape Library Dataserver (ATLDS). See also rack number, slot.

The rectangular juncture of a horizontal row and a vertical column. Examples include the cells of an electronic spreadsheet and the cells utilized by an XmRowColumn widget in an AIXwindows graphic interface.

In a multidimensional clustering table, a unique combination of dimension values. Physically, a cell is made up of blocks of pages whose records all share the same values for each dimension column.

In mobile computing, an area of radio coverage that is transmitted from a base station. See also base station, radio.

cellular digital packet data (CDPD)A standard for transmitting data over a cellular network that places the data in digital electronic envelopes and sends it at high speed through underused radio channels or during pauses in cellular phone conversations. See also packet switching.

cell UUIDA Universally Unique Identifier for a cell that is based on the unique system ID of the workstation and a time stamp.

CelsiusPertaining to a thermometric scale at which water boils at 100 degrees and freezes at 0 degrees in standard atmospheric pressure.

center cellThe only cell in a star topology with the ability to make autonomic decisions.

Center for the Information of Industry data format (CII data format)Data format that provides the Japanese syntax definition for EDI messages within Sterling B2B Integrator.

centering identifierThe category item with which all other identifiers have interacted. The centering identifier is the central item in an investigation.

center of competency (COC)

centimeter (cm)One hundredth of a meter; 0.39 inch.

central control unit (CCU)The communication controller hardware unit that contains the circuits and data flow paths needed to execute instructions and to control controller storage and the attached adapters.

central data warehouseThe component of Tivoli Enterprise Data Warehouse that contains the cleansed historical data. Data in the central data warehouse is derived from operational data, although operational data is not stored directly in the central data warehouse.

central data warehouse ETLIn Tivoli Enterprise Data Warehouse, the extract, transform, and load (ETL) process that reads the data from the operational data stores of the application that collects it (for example, a log file, a Tivoli Inventory repository, or a Tivoli Enterprise Console database), verifies the data, makes the data conform to the Tivoli Enterprise Data Warehouse schema, and places the data into the central data warehouse. See also data mart ETL.

central directoryA repository for storing resource location information centrally registered by network nodes or cached as the result of network searches.

central directory architectureDirectory architecture in a Domino domain in which some servers store configuration directories and use primary Domino Directories on remote servers for lookups.

central directory server (CDS)A network node that provides a repository for information on network resource locations. It also reduces the number of network searches by providing a focal point for queries and broadcast searches, and by storing the results of network searches to avoid later broadcasts for the same information.

centralized controlA type of control in which in which all the primary station functions of the data link are centralized in one data station. See also independent control.

centralized directory serviceIn OSI, a method of organizing directory services so that one node provides directory service for other nodes. OSI Communications Subsystem supports only centralized directory service.

centralized processingIn CICS, processing in which the application is processed on a central processor, which users access using a terminal.

centrally managed serviceA pureScale service that is fully managed by IBM Systems Director.

Central Message Store (CMS)A mailbox system that processes documents and controls services such as messaging, archiving and queuing.

central office (CO)A telephone switching system that connects customer-premise business and subscriber lines to other customer lines or trunks, both locally or remotely. A central office is located on the edge of the telephone service provider's network, rather than on a customer's premises.

central processor (CP)The part of the computer that contains the sequencing and processing facilities for instruction execution, initial program load, and other machine operations.

central processor complex (CPC)A physical collection of hardware that consists of main storage, one or more central processors, timers, and channels.

central registryA server's database that logs requests for licenses, upgrades for licenses, and journals all license activity in a tamper-proof auditable file. The central registry is a component of the License Use Management network topology.

central resource registrationA process in which an APPN network node sends information about itself and its client end nodes to a central directory server.

central schedulerA function that permits an administrator to schedule client operations and administrative commands. The operations can be scheduled to occur periodically or on a specific date. See also administrative command schedule, client schedule.

central siteIn a network of systems, the system licensed to receive program temporary fixes (PTFs) and distribution media from IBM. This system is also used to provide problem handling support to other systems in a network. In a distributed data processing network, the central site is usually defined as the focal point in a communications network for alerts, application design, and remote system management tasks such as problem management.

central site control facility (CSCF)In Tivoli NetView for OS/390, NetView for VM, and NetView for VSE, a function that allows a network operator to run the test facilities of the IBM 3172 Nways Interconnect Controller and the IBM 3174 Establishment Controller remotely from the NetView console.

central storageStorage that is an integral part of the processor unit. Central storage includes both main storage and the hardware system area. UNIX-experienced users refer to central storage as memory.

central systemA single system that handles all of the communications to an endpoint system.

A digital certificate that is issued by a certificate authority. The CA verifies trusted certificates for trusted roots.

In computer security, a digital document that identifies an organization that issues certificates. See also digital certificate.

certificate authority enterprise applicationA company application that provides certificates and private keys for its client applications.

certificate chainA path that traces certificates from a branch in the hierarchy to the primary CA certificate.

certificate filterA filter that defines a set of similar distinguished name certificate attributes for a group of certificates in an X.509 source user registry.

certificate name filterA general resource profile that maps multiple user IDs to a digital certificate in order to simplify administration of certificates, conserve storage space in the RACF database, maintain accountability, or maintain access control granularity.

certificate revocation list (CRL)A list of certificates that have been revoked before their scheduled expiration date. Certificate revocation lists are maintained by the certificate authority and used, during a Secure Sockets Layer (SSL) handshake to ensure that the certificates involved have not been revoked.

certificate signing request (CSR)An electronic message that an organization sends to a certificate authority (CA) to obtain a certificate. The request includes a public key and is signed with a private key; the CA returns the certificate after signing with its own private key. See also certificate, keystore.

certificate store

A collection of certificates.

The Windows name for a key repository.

certificationA process that creates special signed messages called certificates, which state that a particular public key is associated with a particular user or server name.

certifier IDA file that generates an electronic "stamp" that indicates a trust relationship. It is analogous to the device used to stamp passports--it verifies that a person is trusted by that stamping authority.

certifier ID fileA file that generates an electronic "stamp" that indicates a trust relationship. It is analogous to the device used to stamp passports--it verifies that a person is trusted by that stamping authority.

CGI scriptA computer program that runs on a web server and uses the Common Gateway Interface (CGI) to perform tasks that are not usually done by a web server (for example, database access and form processing).

A group of logically linked records that are transferred over a communications line.

A set of enclosures that are attached to provide redundant access to the drives inside the enclosures. Each control enclosure can have one or more chains.

In RPG, an operation code that reads input records identified by specified relative record numbers or keys.

A group of request units delimited by begin-chain and end-chain. Responses are always single-unit chains.

The name of a channel framework connection that contains an endpoint definition.

In DFU, a way to change from one display format to another after the user signals that the first display format was completed.

chain assemblyIn CICS intercommunication, a grouping of one or more request units to satisfy a single request. Instead of an input request being satisfied by one RU at a time until the chain is complete, the whole chain is assembled and sent to the CICS application satisfying just one request. This ensures that the integrity of the whole chain is known before it is presented to the application program.

chained orderAn order that must finish its fulfillment process before its parent order can be considered fulfilled. An order is chained when a parent order must communicate some portion of the order fulfillment execution to a third party.

chain eraseThe process of erasing a snapshot chain.

chaining

A method of storing records in which each record belongs to a list or group of records and has a linking field for tracing the chain.

In the Distributed Computing Environment (DCE), a mode of interaction optionally used by a directory system agent (DSA) that cannot perform an operation by itself. The DSA chains by invoking the operation in another DSA and then relaying the outcome to the original requester.

challengeA request for certain information to a system. The information, which is sent back to the server in response to this request, is necessary for client authentication.

challenge handlerA client-side component that issues a sequence of challenges on the server side and responds on the client side. See also authenticator.

Challenge Handshake Authentication Protocol (CHAP)An authentication protocol that protects against eavesdropping by encrypting the user name and password. See also Password Authentication Protocol.

challenge-response authenticationAn authentication method that requires users to respond to a prompt by providing information to verify their identity when they log in to the system. For example, when users forget their password, they are prompted (challenged) with a question to which they must provide an answer (response) in order to either receive a new password or receive a hint for specifying the correct password.

chameleon schemaA schema that inherits a target namespace from a schema that includes the chameleon schema.

change

An artifact that represents a generalized notion of a development work product, such as a task, defect report, or enhancement request. See also initiative.

A function or mode that enables a user to modify a specified character string in previously entered text.

changeable media originIn printers, the ability to accept a command that changes the point on the medium where printing begins.

change accumulation

The process of merging log data sets and reducing the information they contain to the minimum required to perform recovery on a particular database or group of databases.

The process of creating a compacted version of one or more IMS log data sets by eliminating records not related to recovery, and by merging multiple changes to a single segment into a single change.

change aggregate tableIn SQL replication, a type of replication target table that contains data aggregations that are based on the contents of a CD table. See also base aggregate table.

change and configuration management (CCM)A systematic approach to establish and maintain the consistent performance of a system or product throughout its lifecycle, and to effectively manage changes in that product or system.

change authorityAn object authority that allows a user to perform all operations on the object except those limited to the owner or controlled by object existence authority, object management authority, object alter authority, and object reference authority. The user can add, change, and delete entries in an object, or read the contents of an entry in the object. Change authority combines object operational authority and all the data authorities.

change bar

A character used in the left margin to indicate that a document line is changed.

An indicator that displays when an object was last changed.

change basis versionThe version of the server partition that changes were made against.

change-capture replicationThe process of capturing changes that are made to a replication source table and applying them to a replication target table. See also full refresh.

change control (CC)The use of change management commands for the installation or removal of software or data.

change control administratorA person responsible for software distribution and change control activities.

change control clientA workstation that (a) receives software and data files from its change control server and (b) installs and removes software and data files as instructed by its change control server. See also change control single node.

change control domainA change control server and its change control clients.

change control serverA system that controls and tracks the distribution of software and data files to other workstations. See also change control single node.

change control single nodeA workstation that controls, tracks, installs, and removes software and data files for itself. A CC single node can also prepare software for distribution. See also change control client, change control server.

change-data table (CD table)In SQL replication, a replication table on the Capture control server that contains changed data for a replication source table. See also synchpoint.

change-direction protocolIn SNA, a data flow control protocol in which the sending logical unit (LU) stops sending normal-flow requests, signals this fact to the receiving LU using the change-direction indicator (in the request header of the last request of the last chain), and prepares to receive requests.

changed subfile recordA subfile record into which the work station user has entered data, or a subfile record for which a write or change operation was issued with the DDS keyword SFLNXTCHG or DSPATR(MDT) in effect.

change fileA file formatted to the specifications outlined by LLIS. A change file is used for bulk changes to existing user accounts.

change historyA section that displays modifications in the data records, such as supplier records and organization records.

change implementation scheduleA view in change management that shows the start and end dates for changes to selected configuration items in the environment, the RFC that defines the change, and other details.

change listenerIn Java, a listener that is notified when an object is changed in any way.

change log

For directory shadowing, a record of changes made to directory entries, departments, and locations for the purpose of sending only the updates and not the entire directory to collecting systems.

The area of the checkpoint data set that contains the specific control blocks changed by the last member of the multi-access spool configuration to own the checkpoint data set.

change-managed relationshipA relationship between two artifacts. A change to either artifact affects the relationship. See also suspect relationship state.

change management

The process of controlling and tracking modifications to artifacts.

The process of planning (for example, scheduling) and controlling (for example, distributing, installing, and tracking) software changes over a network.

The process of planning for and executing changes to configuration items in the information technology environment. The primary objective of change management is to enable beneficial changes to be made with minimum disruption to services.

change number of sessions (CNOS)An internal transaction program that regulates the number of parallel sessions between the partner LUs with specific characteristics.

change order

A record of the changes made during the course of a contract or project execution.

An update to a purchase order that is already approved or printed and that changes information such as quantity or vendor.

change ownershipA method of transferring ownership of a case or a document to another user using Intel L.E.A.D.

change projectA project that is implemented on a staging or a testing environment before being implemented on a production environment to mitigate and minimize operational errors.

change proposal systemA system that allows users to review modules and suggest changes to them.

change recordA recorded instance that is created with each write action to the repository. The change record contains metadata about all repository changes (such as who was responsible for a commit action) and can be used as a version history view of the repository.

change request (CRQ)

In System Manager, an instance of a change request description that has been submitted to run or is running. A change request is uniquely identified by the change request name and a sequence number.

A request to change some aspect of the project, project plan, activity definition, or document.

A small, independent unit of work into which each change project is divided.

A request created in the Telecom Portal application to replace a device, or change a rate plan.

change request description (CRQD)An i5/OS object that describes a change to be made to the computing environment. The object, which is maintained only at the central site system or systems, consists of a list of activities that describe the steps needed to make the change.

change set

A group of related changes to artifacts in a workspace or stream.

A list of versions of elements that are associated with a Unified Change Management (UCM) activity.

A cohesive unit consisting of a number of related changes that need to be made together.

change tableA table that is used to change company codes, account codes, extended dimension codes, or to merge accounts or dimensions.

change volumeA volume that is used in Global Mirror that holds earlier consistent revisions of data when changes are made.

change windowA period of time defined for one or more configuration items, which specifies when the CIs can be taken out of service for changes to be made, with minimal impact on services.

change window conflictA condition that occurs when implementation tasks have been scheduled for a CI outside its change window.

channel

A collection of test environment properties that describes a delivery platform in your test effort.

A communication path through a chain to an endpoint.

In mainframe computing, the part of a channel subsystem that manages a single I/O interface between a channel subsystem and a set of control units.

A WebSphere MQ object that defines a communication link between two queue managers (message channel) or between a client and a queue manager (MQI channel). See also message channel, MQI channel, queue manager.

The means of distribution of a company's products. Examples are e-commerce and physical stores.

A link along which signals can be sent, such as the channel that handles the transfer of data between processor storage and local peripheral equipment. See also trunk.

A specialized web application within a portal to which a user can subscribe.

channel actionA business function that can be issued on a channel. Channel actions are role specific and an authorization policy makes it possible to control which role can perform which action in a channel.

channel adapter (CA)A communication controller hardware unit that is used to attach the communication controller to a host channel.

channel address word (CAW)An area in storage that specifies the location in main storage at which a channel program begins.

channel applicationAn application that is used to place an order in a store or online call center of a retail business.

channel associated signaling (CAS)A method of communicating telephony supervisory or line signaling (on-hook and off-hook) and address signaling on T1 and E1 digital links. See also common channel signaling.

channel-attached

Pertaining to devices attached to a controlling unit by cables, rather than by telecommunication lines. See also link-attached.

Pertaining to the attachment of devices directly by input/output channels to a host processor.

channel-attachment major nodeA major node that may include minor nodes that are resources (host processors, NCPs, line groups, lines, SNA physical units and logical units, cluster controllers, and terminals) attached through a communication adapter.

channel bankA device that converts an analog line signal to a digital trunk signal.

channel callbackA mechanism that ensures that the channel connection is established to the correct machine. In a channel callback, a sender channel calls back the original requester channel using the sender's definition.

channel codeA number from 1 to 12 that identifies a position in a forms-control buffer or a page definition.

channel commandAn instruction that directs a data channel, control unit, or device to perform an operation or set of operations.

channel command retry (CCR)In mainframe computing, the protocol used between a channel and a control unit that enables the control unit to request that the channel reissue the current command.

channel command word (CCW)In zSeries systems, an 8-byte command issued to the channel subsystem by a central processor and operating asynchronously with the issuing processor.

channel-control checkA category of I/O errors affecting channel controls and sensed by the channel to which a device is attached.

channel control function (CCF)A program to move messages from a transmission queue to a communication link, and from a communication link to a local queue, together with an operator panel interface to allow the setup and control of channels.

channel counterA counting device that identifies how many pages have been successfully received.

channel-data checkA category of I/O errors, indicating a machine error in transferring data to or from storage and sensed by the channel to which a device is attached.

Channel Data Link Control protocol (CDLC, CDLC protocol)A channel communications protocol that is used to communicate between VTAM and a front end processor (either hardware or emulated).

channel eventAn event reporting conditions detected during channel operations, such as when a channel instance is started or stopped. Channel events are generated on the queue managers at both ends of the channel.

channel exit programA user-written program that is called from one of a defined number of places in the processing sequence of a message channel agent (MCA).

channel IDAn identification number that is passed back from a multiplexed device to the file system as a result of calling the device driver multiplex (ddmpx) entry point.

channel initiatorA component of WebSphere MQ distributed queuing that monitors the initiation queue and starts the sender channel when triggering criteria are met.

channel interfaceThe circuitry in a storage control that attaches storage paths to a host channel.

channel linkA System/390 I/O channel-to-control-unit interface that has an SNA network address. A channel link can be a subarea link, a peripheral link, a LEN link, or an APPN link. See also subarea link.

channel listenerA component of WebSphere MQ distributed queuing that monitors the network for a startup request and then starts the receiving channel.

channel managerA defined role in WebSphere Commerce that manages the channel hub, as well as the distributors and resellers associated with that hub, including creating and importing distributor and reseller contracts.

channel number

A number that identifies the path by which data is transferred between a particular input or output device and the processor of the computer.

The identifying number assigned to a licensed channel on the T1 or E1 trunk that connects DirectTalk to the switch, channel bank, or channel service unit.

channel path

In mainframe computing, the interconnection between a channel and its associated control units.

A single interface attaching one or more control units.

channel-path identifier (CHPID)

A value assigned to each installed channel path of the system that uniquely identifies that path to the system.

In a channel subsystem, a value that is assigned to each installed channel path of the system that uniquely identifies that path to the system.

channel process (CHP)

The AIX process that executes the logic of the state table; each active caller session has one active channel process.

In WebSphere Voice Server, the system process that manages call flow.

channel programA sequence of one or more channel command words (CCWs) issued to one device.

channel service unit (CSU)

A device used to connect a digital phone line to a multiplexer, a channel bank, or directly to another device producing a digital signal. A CSU performs certain line-conditioning and equalization functions, and responds to loopback commands sent from the central office (CO). See also data service unit.

An American Telephone and Telegraph (AT&T) unit that is part of the AT&T nonswitched digital data system.

channel stationIn certain printers, a page-counting device that counts the number of pages queued for printing.

channel status word (CSW)A field that provides the program with the status of an I/O device or the conditions under which an I/O operation has been terminated.

channel subsystem (CSS)A collection of subchannels that directs the flow of information between I/O devices and main storage, relieves the processor of communication tasks, and performs path management functions.

channel-subsystem imageIn mainframe computing, the logical functions that a system requires to perform the function of a channel subsystem. With ESCON multiple image facility (EMIF), one channel-subsystem image exists in the channel subsystem for each logical partition (LPAR). Each image appears to be an independent channel-subsystem program, but all images share a common set of hardware facilities.

channel-to-channel (CTC)Pertaining to the physical connection or the interaction of two devices.

channel-to-channel adapter (CTC adapter)A device for connecting two channels on the same processor or on different processors.

chaotic relaxationAn iterative relaxation method that uses a combination of the Gauss-Seidel and Jacobi-Seidel methods. The array of discrete values is divided into subregions that can be operated on in parallel. The subregion boundaries are calculated using the Jacobi-Seidel method, while the subregion interiors are calculated using the Gauss-Seidel method. See also Gauss-Seidel.

CHAP secretIn the Challenge-Handshake Authentication Protocol (CHAP), a secret passphrase that is used to authenticate a storage system to iSCSI-attached hosts.

character

Any symbol that can be entered on a keyboard, printed, or displayed. For example, letters, numbers, and punctuation marks are all characters.

A sequence of one or more bytes representing a single graphic symbol or control code.

In bar codes, a single group of bars and spaces that represent an individual number, letter, punctuation mark, or other symbol.

In a computer system, a member of a set of elements that is used for the representation, organization, or control of data. See also glyph.

character angleIn architecture, the angle that is between the baseline of a character string and the horizontal axis of a presentation space or physical medium.

character arrangement tableAn array of data that translates input data into printable characters and identifies associated character sets and graphic character modification modules.

character arrayA named list or table of character data.

character attributeA code that defines a single property of a character or characters; for example, extended color, character set, or extended highlighting. A character can have more than one defined character attribute.

character-based interfaceA computer interface that shows only characters and no graphics on the screen.

In the GDDM function, the imaginary box whose boundaries govern the size, orientation, and spacing of individual characters to be displayed on a work station.

The physical width and height in pels of a font.

An addressable location on a display surface or printing medium. The character cell defines the placement of characters with respect to preceding and following characters.

As defined in ISO/IEC 10646, the place within a row at which an individual graphic character may be allocated.

The maximum physical boundary of a single character. For example on the IBM 3800 Printing Subsystem, a cell is made up of 24 rows with total height of 4.23 mm and 18 bit positions having a total width of 2.54 mm.

character cell sizeIn architecture, the size of a rectangle in a drawing space used to scale font symbols into the drawing space.

character classA named set of characters sharing an attribute associated with the name of the class. The classes and the characters that they contain are dependent on the value of the LC_CTYPE category in the current locale.

character code

In System i Access, an ASCII or EBCDIC value assigned to the symbols or functions that are used by a computer.

An element of a code page or a cell in a code table to which a character can be assigned. The element is associated with a binary value.

character concatenated expressionA concatenated expression that consists of one or more character columns, string literals, or substrings of character columns.

character constant

In the C language, a character or an escape sequence enclosed in quotation marks.

The actual character value (a symbol, quantity, or constant) in a source program that is itself data, instead of a reference to a field that contains the data. See also numeric constant.

character conversionThe process of changing data from one character coding representation to another.

character conversion tableA table that converts one or more characters to alternative characters using hexadecimal encoding for the character sets. The character sets are defined in code pages.

character coordinate systemAn orthogonal coordinate system that defines font and character measurement distances.

character data

Data that has an associated coding representation that defines how to interpret each specific pattern of bits that are grouped into one or more bytes.

Data in the form of letters and special characters, such as punctuation marks.

Character Data Representation Architecture (CDRA)An IBM architecture that defines a set of identifiers, resources, services, and conventions to achieve consistent representation, processing, and interchange of graphic character data in heterogeneous environments.

character data representation identifierA tag that is used to achieve data integrity. The Character Data Representation Architecture specifies that you should tag all character data as it flows through the system. You can tag using a short-form or a long-form identifier. A coded character set identifier (CCSID) is an example of a character data representation identifier.

character densityA measure of the horizontal spacing of characters.

character deviceA device that handles data one character at a time.

character directionIn Graphic Object Content Architecture, an attribute controlling the direction in which a character string grows relative to the inline direction. Values are left-to-right, right-to-left, top-to-bottom, and bottom-to-top. See also escapement direction.

character displayA display that uses a character generator to display predefined character boxes of images (characters) on the screen. This kind of display cannot address the screen any less than one character box at a time.

character encoding

A character set consisting of a code that pairs a sequence of characters from a given set with something else, such as a sequence of natural numbers, octets or electrical pulses. Encoding facilitates the storage and transmission of text through telecommunication networks.

The mapping from a character (a letter of the alphabet) to a numeric value in a character code set. For example, the ASCII character code set encodes the letter "A" as 65, while the EBCIDIC character set encodes this letter as 43. The character code set contains encodings for all characters in one or more language alphabets.

character entity referenceA character string of the form &#xdddd or &#dddd, where dddd is the hexadecimal or decimal equivalent of the Unicode code point of a character. For example, &#x003E and &#0062 are both character entity references to the > (greater-than) sign.

character escapement pointThe point where the next character reference point is usually positioned.

character expressionA character constant, a simple character variable, an element of a character array, a character-valued function reference, a substring reference, or a sequence of the above separated by the concatenation operator and parentheses.

character fieldAn area that is reserved for information that can contain any of the characters in the character set. See also numeric field.

character formatIn REXX, a format that is used in the REXX conversion functions to indicate that data is in a textual form as opposed to machine-readable form.

character generator

In word processing, the way to generate visual characters and symbols for coded data.

In computer graphics, a function that converts the coded representation of a graphic character into the shape of the character for display or print.

character generator utility (CGU)A function of the Application Development ToolSet feature that is used to define and maintain user-defined double-byte characters and related sort information.

An image that is composed of symbols printed in a monospace font. Some symbols are standalone; others are intended for assembling larger figures.

character gridIn Business Graphics Utility, an invisible network of uniformly spaced horizontal and vertical lines covering the chart area. Used by the Business Graphics Utility to determine the physical dimensions of the chart and the placement of the data on it.

character grid unitIn Business Graphics Utility, the distance between two adjacent horizontal or vertical lines on a character grid.

character groupAny number of character graphics and character properties.

On a system, a 4-byte binary value. The value is a concatenation of the graphic character set global identifier followed by the code page global identifier. For example, the character identifier for German (feature 2929) is 00697 00273.

The standard identifier for a character, regardless of its style. For example, all uppercase A's have the same character identifier.

character incrementThe distance from the character reference point to the character escapement point. Character increment is the sum of the A-space, B-space, and C-space. Usually the distance between the current print position and the next print position.

character-increment adjustmentIn a scaled font, an adjustment to character increment values. The adjustment value is derived from the kerning track values for the font used to present the characters.

characteristicA user-defined trait or property that is associated with an identity that is not commonly expressed as a name, number, address, or email. This attribute allows users to extend the product by defining customizable entity attributes that are meaningful to their data sources. See also attribute, identity.

characteristic typeA specific classification of a characteristic. Examples of characteristic types include gender and date of birth, but additional characteristic types can be defined.

character large object (CLOB)

A data type whose value is a sequence of characters (single byte, multibyte, or both) that can range in size from 0 bytes to 2 gigabytes less 1 byte. In general, the CLOB data type is used whenever a character string might exceed the limits of the VARCHAR data type. See also large object.

A character string that contains single-byte characters with an associated code page.

character literalA literal that represents character data.

character mappingThe association of code-page code points to the appropriate graphic-character identifiers in a font.

character metricMeasurement information that defines an individual character value such as height, width, or space. Character metrics may be expressed in specific fixed units, such as pels, or in relative units that are independent of both the resolution and size of the font. Often included as part of the general term font metrics. See also character set metric.

character-pattern descriptorIn architecture, information that the printer needs to separate font raster patterns. Each character pattern descriptor is 8 bytes long and specifies both the character box size and an offset value.

character positionOn a display, the location of a character.

character positioningThe process of determining where a character is to appear on a presentation surface.

character precisionIn architecture, the acceptable amount of variation in the appearance of a character on a physical medium from a specified ideal appearance, including no acceptable variation. Examples of appearance characteristics that can vary for a character are shape and position.

character printerA device that prints a single character at a time. See also line printer.

character propertyAny detail about how a character is printed relative to the other characters around it. Character properties are box size, horizontal and vertical character cell size, character ID, center line, baseline, left space, right space, above space, and below space.

character raster patternThe scan (picture element) pattern for a character graphic of a particular size, weight, and style.

character recognitionThe identification of geographic, phonic, or other characters by automatic, magnetic, optical, or mechanical means.

character reference point

The point along the character baseline within the character box that coincides with the current print position.

The point that corresponds to the origin of the character coordinate system. The character reference point coincides with the presentation position when the character is formed in the presentation process. See also current print position.

character rotationThe alignment of a character with respect to its character baseline, measured in degrees in a clockwise direction. See also orientation.

character set

A list of characters (letters, numbers, and symbols such as #, $, and &) that are recognized by computer hardware and software.

A set of binary codes that represent specific text characters.

A defined set of characters with no coded representation assumed that can be recognized by a configured hardware or software system. A character set can be defined by alphabet, language, script, or any combination of these items.

character set attributeIn architecture, an attribute used to specify a coded font.

character set identifier 65534The character set identifier (CCSID) that is used to show that a CCSID value for data at this level of processing is not relevant. When CCSID 65534 ( FFFE ) is associated with data, a CCSID value for the data should be obtained from the tagged fields of elements that are at a lower level in the defined hierarchy. For example, a file has CCSIDs tagged for each individual field it contains. If the file is tagged with CCSID 65534, processing is based on the CCSIDs assigned to each individual field instead of the CCSID assigned to the file.

character set identifier 65535The character set identifier (CCSID) that is used to show that data associated with the CCSID should not be processed as coded-graphic-character data.

character set metricOne of the measurements used to describe a characteristic of the all the characters in that font. Examples are height, width, and character increment for each character of the font. See also character metric, font metric, relative metrics.

character shapeThe visual representation of a graphic character.

character shape presentationThe formation of a character shape on a physical medium at an addressable position determined by the formatting process.

character special fileAn interface file that provides access to an input or output device, which uses character I/0 instead of block I/0. See also block special file.

characters per inch (cpi)The number of characters printed horizontally within an inch across a page.

characters per second (cps)The number of characters that a device can print in one second.

character string

A contiguous sequence of characters that are treated as a unit.

A contiguous sequence of characters terminated by and including the first null byte.

A sequence of bytes that represents bit data, single-byte characters, or a mixture of single-byte and multibyte characters.

character string delimiterA character that is used to identify the beginning and the end of a character string.

character substringA contiguous portion of a character string.

character timesIn CCP, the maximum number of times that the temporary text delay character can (a) be sent to a terminal before the operation stops; or (b) be sent between the end of a receive operation and the beginning of a transmit operation.

character translationIn international character support, the dd command and various conversion subroutines that translate between extended characters and ASCII escape strings to preserve unique character information.

character typeA data type that consists of alphanumeric characters.

character variable

Character data with a value that is assigned or changed while the program is running.

In the C language, a data object having a value that can be changed while a program is running and having a data type that is a signed or unsigned character.

chargeAn assertion of a specific crime for which a suspect has been accused of committing.

charge and allowance codeAn industry-standard identifier that the shipper assigns to each accessorial.

charge-backA financial penalty that is assigned to a vendor for violations to compliance rules and other criteria.

charge-back accountAn account used for tracking computing resource usage by business departments or projects. Examples of charge-back accounts are "Marketing Department" or "Summer catalog project."

chargeback allocationA charge category used for cost allocation.

charge-back identifierA label, which is often tied to an algorithm or set of rules, that is not guaranteed to be unique, but is used to identify and distinguish a specific charge-back item or charge-back entity from others.

charge codeAn accounting code that is used to register and categorize costs against project budgets.

charge featureAn optional feature for either software or hardware for which there is a charge.

charge outTo check out and track a physical record.

charge sequenceThe sequence in which Sterling Selling and Fulfillment Foundation creates authorization or charge requests. For example, the charge sequence might specify that gift certificates are to be used before a credit card is charged.

A picture defined in terms of graphics primitives and graphics attributes.

A visual representation of real-world objects, such as organizations, people, events, or locations, and the relationships between them.

chart areaIn the GDDM function, the part of the picture space in which a business chart is to be drawn.

chart formatIn Business Graphics Utility, an object containing chart characteristics, such as the chart type, chart heading, legend position, and so on. The chart format does not include the data values to be plotted. The system-recognized identifier for the object type is *CHTFMT.

chart fragmentA view of a chart that highlights particular items of interest.

charting schemeA definition that describes how item data behaves when it is visualized on a chart. For example, how data is copied into chart item properties, the chart template and labeling scheme to use, and whether to display attributes and pictures. See also chart template.

chart layerA map layer that contains the items that have been sent from the chart surface to the mapping tool.

chart layoutIn Business Graphics Utility, the arrangement of the various parts in the chart area and surrounding margins.

chart of accounts (COA)A detailed listing of all the accounts used by a company.

chart propertyA characteristic of a chart, such as its summary description, time zone, grid size, background color, or merge and paste rules. Chart properties are saved with the chart. See also chart template.

chart seriesA selection of a category of data that will be represented by a chart in a report. A chart can have multiple chart series to represent multiple types of data.

chart templateAn object that is used for chart creation that contains preconfigured chart properties, and lists of permitted entity types and link types. See also chart property, charting scheme.

CHASEIn SNA, a command used by the host system to determine when the secondary logical unit has finished processing all previously sent response units.

chassisThe metal frame in which various electronic components are mounted.

chassis detect-and-deploy profileA profile that IBM Director automatically applies to all new BladeCenter chassis when they are discovered. The profile settings include management module name, network protocols, and static IP addresses. If Remote Deployment Manager (RDM) is installed on the management server, the chassis detect-and-deploy profile also can include deployment policies.

chatThe sending of typed messages between online participants.

chat scriptIn remote communication, a list of expect-send sequences that a modem uses to establish a communication link with another modem.

chat transcriptA file that contains a copy of the typed messages between participants in a chat meeting.

cheat sheetAn interface that guides users through the wizards and steps required to perform a complex task, and that links to relevant sections of the online help.

check

A process for determining accuracy.

In printers, an action message that instructs the printer operator to inspect a component. For example, the CHECK TONER COLLECTOR message means that the operator should look at the toner-collector bottle and make sure that it is physically present, in the proper place, and correctly installed.

A periodic inspection of an aircraft after a specified amount of time in service.

To look for a condition.

check boxA square box with associated text that represents a choice. When a user selects the choice, the check box is filled to indicate that the choice is selected. The user can clear the check box by selecting the choice again, thereby deselecting the choice.

check characterA character used for the purpose of performing a check.

In certain software configuration management (SCM) systems, to copy files back into the repository after changing them.

To upload the language of a checked out draft authored/received contract or amendment contract into the application.

To replace an inactive document, project WBS element, scope element, requirement or resource record (with its modifications) to its repository directory so that others can view it or modify it.

To save local changes in a change set that is part of a repository workspace. A checked-in change set can later be shared with a team by delivering the change set.

check-in screenThe screen identifying the host screen that should be active for a connection to be considered ready to be returned to the connection pool. If the application is not on the screen specified by the check-in screen, the connection will be discarded or recycled in attempt to return the connection to the host screen specified by the check-in screen. The check-in screen is only meaningful if connection pooling is specified for a connection.

check integrityThe condition that exists when each row in a table conforms to the check constraints that are defined on that table.

check out

To remove an active document, project WBS element, scope element, requirement or resource record from its repository directory in order to modify it. Only one individual may check out the same element at a time.

To download the language of a draft authored/received contract or amendment contract from the application to modify it.

In certain software configuration management (SCM) systems, to copy the latest revision of a file from the repository so that it can be modified. See also reservation version status.

check pending

A state that occurs when data for a constraint cannot be verified as valid. A constraint could be either a referential constraint or a check constraint.

In DB2 for z/OS, a state into which a table can be put where only limited activity is allowed on the table and constraints are not checked when the table is updated. See also set integrity pending.

checkpoint

A point at which the database manager records internal status information in the log; the recovery process uses this information if the subsystem abnormally terminates.

A compressed file that contains configuration data from a specific point in time.

A place in a program at which a check is made, or at which a recording of data is made to allow the program to be restarted in case of interruption.

checkpoint algorithmThe algorithm that determines when to commit all global transactions for the job steps in a batch application. See also results algorithm.

checkpoint data setA local data set that contains Common Queue Server (CQS) system checkpoint information about a group of shared queues.

checkpointingThe periodic copying of processing information to the checkpoint data set. Checkpointing ensures that information about in-storage job and output queues is not lost in the event of a hardware or software error.

checkpoint reconfiguration dialogAn interactive form of a JES2 checkpoint reconfiguration that directs the reconfiguration process with replies to a series of WTOR messages.

checkpoint restartThe process of resuming a job at a checkpoint within the job step that caused abnormal termination. The restart can be automatic or deferred. A deferred restart requires that the job be resubmitted. See also automatic restart, deferred restart, step restart.

checkpoint/restart facilityA facility for restarting execution of a program at some point other than at the beginning, after the program was terminated due to a program or system failure. A restart can begin at a checkpoint or from the beginning of a job step, and uses checkpoint records to reinitialize the system.

checkpoint sizeIn OSI X.400, the maximum amount of data (in units of 1024 bytes) that can be sent between two minor synchronization points. The checkpoint size is used by the X.400 reliable transfer server.

check point snapshotA snapshot, created at the end of a snapshot chain, that contains all changes from the last incremental delta block.

checkpoint writeAny write to the checkpoint data set. A checkpoint write is a primary, intermediate, or final write that updates a checkpoint data set.

On a diskette, data written in a section for error detection purposes.

A small piece of data that is derived from an arbitrary block of digital data for the purpose of detecting errors that might have been introduced during its transmission or storage.

The sum of a group of data that is associated with another group of data and that is used for error detection.

checksum protection

A function that protects data stored in an auxiliary storage pool from being lost because of the failure of a single disk. When checksum protection is in effect and a disk failure occurs, the system automatically reconstructs the data when the system program is loaded after the device is repaired. See also device parity protection, mirrored protection.

In TCP/IP, the sum of a group of data associated with the group and used for error checking purposes.

checksum setUnits of auxiliary storage defined in groups to provide a way for the system to recover data if a disk failure occurs when checksum protection is in effect.

chicken roleIn agile development, the peripheral participants in scrum development. This includes the product manager, testers, customers, customer advocates, and other stakeholders. See also pig role, scrum.

child circuitA circuit that is a subordinate circuit under a parent circuit.

child classA class that inherits instance methods, attributes, and instance variables directly from the parent class (also known as the base class or superclass), or indirectly from an ancestor class.

child componentOptional second or lower level of a hierarchical item type. Each child component is directly associated with the level above it.

child deviceA device that is connected to a parent device.

child documentA document that inherits its values from another document (the parent document).

child enclaveThe nested enclave created as a result of certain commands being issued from a parent enclave. See also nested enclave, parent enclave.

child expressionA list of columns in a child table that relate to corresponding columns in a parent table. See also parent expression.

child itemAn item that is a part of an item with variations and has the same set of attributes as the item with variations, with minor distinct differences.

child lockIn explicit hierarchical locking, a lock that is held on a table, a page, a row, or a large object. Each child lock has a parent lock. See also parent lock.

child nodeA node within the scope of another node. See also parent node.

child orderFor subscriptions or recurring orders, the subordinate to the parent order. For example, a parent order is the subscription to the magazine itself, while the child order is one of the monthly issues. See also parent order.

child organizational entityOne or more further levels of organizational entities that exist beneath the parent organizational entity.

child processA process that is created by a parent process and that shares the resources of the parent process to carry out a request.

child resourceA secured resource, either a file or library, that uses the user list of a parent resource. A child resource can have only one parent resource.

child resource groupA resource group that depends on certain application services that a parent resource group provides. A child resource group is acquired on any node in the cluster only after the parent resource group has been activated. See also dependent resource groups, parent resource group.

child segmentIn a database, any segment that is dependent on another segment above it (its parent) in the hierarchy.

child tableA table that has a referential constraint to a column in a different table; the referenced table is called a parent table. See also parent table.

child URA unit of recovery (UR) cascaded from a parent UR in a cascaded transaction.

child widgetIn AIXwindows and Enhanced X-Windows, a widget that is managed by another widget, the parent. For example, Composite widgets typically manage the Primitive children widgets attached to them.

child windowA window that appears within the border of its parent window (either a primary window or another child window). When the parent window is resized, moved, or destroyed, the child window also is resized, moved, or destroyed. However, the child window can be moved or resized independently from the parent window, within the boundaries of the parent window.

child work itemA work item created for each participant in a multi-participant step and for each route taken simultaneously from an AND-split step.

China Association for Standards (CAS)The national standards-setting organization in The Peoples' Republic of China.

Chinese numeralOne of the Chinese characters that represent numbers. For example, the Chinese characters for 1, 2, and 3 are written with one, two, and three horizontal brush strokes, respectively. See also Arabic numeral, Hindi numeral, number, Roman numeral.

chi-squareA test statistic used to indicate the probability that two fields are unrelated, in which case any differences between observed and expected frequencies are the result of chance alone. If this probability is very small (typically less than 5%) the relationship between the two fields is said to be significant.

choiceAn option in a pop-up window or menu used to influence the operation of the system.

choice activityOne of three types of complex BPML activities. A choice activity is used to make decisions in the business process model and runs only one of the child activities it contains. The choice activity makes it possible to model branch processing.

choice listA list of predefined property values. A choice list presents a list of valid choices, such as a list of states or ZIP codes.

choice pointA point that is set automatically by CP Optimizer as it executes a goal during the search for a solution. At the choice point, the engine records the current state of constraints, variables, and domains, along with other goals not yet executed. If execution of the goal leads to failure, CP Optimizer backtracks to the choice point, restores the state recorded, and tries one of the stored goals.

choice typeA group type with a subclass equal to choice that is used to define a selection from a set of components. A choice type defines a choice group, which is valid when the data matches one of the components in the choice group.

Cholesky factoringA technique that is used to factor a matrix into the product of a lower triangular matrix and its conjugate transpose.

chordA short line segment whose end points lie on a circle. Chords are a means for producing a circular image from straight lines.

choreAn object that executes one or more processes at a user-defined frequency.

choreography

An ordered sequence of message exchanges between two or more participants. In a choreography there is no central controller, responsible entity, or observer of the process.

An agreed upon sequence of business events that is allowed by a seller for each transaction.

CICS bundleA set of XML files that defines or references the resources for a component of an application or a whole application, or another artifact relating to applications, such as a policy. A CICS bundle is installed in a CICS region. Multiple CICS bundles can be referenced by a management bundle. See also bundle, management bundle.

CICS-deployed JAR fileA deployed JAR file that has been produced specifically for the CICS EJB server and stored in the hierarchical file system.

CICS dynamic storage area (CDSA)A storage area allocated from CICS-key storage below the 16 MB line. The CDSA is used for all non-reentrant CICS-key RMODE(24) programs, all CICS-key task-lifetime storage in 24-bit storage, and CICS control blocks that reside in 24-bit storage.

CICS EJB serverOne or more CICS regions that support enterprise beans. A logical CICS EJB server typically consists of multiple (cloned) CICS listener regions and multiple (cloned) CICS AORs. The listener regions and AORs may be combined into listener/AORs.

CICS-keyStorage protection key in which CICS is given control (key 8) when CICS storage protection is used. This key is for CICS code and control blocks. CICS-key storage can be accessed and modified by CICS. Application programs in user-key cannot modify CICS-key storage, but they can read it. CICS-key storage is obtained in MVS key-8 storage. See also user-key storage.

CICS-maintained data tableA type of CICS data table, for which CICS automatically maintains consistency between the table and its source data set. All changes to the data table are reflected in the source data set and all changes to the source data set are reflected in the data table.

CICSplexA set of CICS systems that are managed and manipulated as if they were a single entity. A CICSplex can be managed by CICSPlex SM. See also multiregion operation.

CICSPlex SM address space (CMAS)A CICSPlex SM component that is responsible for managing CICSplexes. A CMAS provides the single-system image for a CICSplex by serving as the interface to other CICSplexes and external programs. There must be at least one CMAS in each MVS image on which you are running CICSPlex SM. A single CMAS can manage CICS systems within one or more CICSplexes.

CICS primary connection regionThe web owning region (WOR) of the Multi-Region Option (MRO) connected regions in a CICS test environment. This is the region in which the CICS resource definition server for Application Deployment Manager runs.

CICS regionAn instance of CICS Transaction Server that runs in its own z/OS address space.

CICS region user IDThe user ID assigned to a CICS region at CICS initialization. It is specified either in the RACF started procedures table when CICS is started as a started task, or on the USER parameter of the JOB statement when CICS is started as a job.

CICS run unitA set of statically bound, dynamically bound, or both, modules that can be loaded by a CICS loader.

CICS segmentThe portion of a RACF profile containing data for CICS.

CICS system

The entire collection of hardware and software required by CICS.

In CICSPlex SM topology, a definition referring to a CICS system that is to be managed by CICSPlex SM.

CICS system definition data set (CSD)A VSAM KSDS cluster that contains a resource definition record for every record defined to CICS using resource definition online (RDO).

CICS system group

In CICSPlex SM topology, the user-defined name, description, and content information for a CICS system group. A CICS system group can be made up of CICS systems or other CICS system groups.

A set of CICS systems within a CICSplex that can be managed as a single entity.

In CICS business transaction services (BTS), a BTS set, that is the set of CICS regions across which BTS processes and activities may execute.

CICS Transaction Affinities UtilityA utility designed to detect potential causes of inter-transaction affinity and transaction-system affinity for those users planning to use dynamic transaction routing.

CICS-value data area (CVDA)An argument to which CICS has assigned a specific and limited set of meaningful values. When a CVDA is specified in an EXEC CICS command, CICS converts the CVDA value name to the corresponding numeric representation.

CID methodologyAn IBM-specified way to install and configure products on, or remove products from, remote workstations and hosts. Response files and redirected installation and configuration may be used by a CID-enabled product to eliminate or reduce user interaction with the CID-enabled product. See also response file.

CIM agentThe code that consists of common building blocks that can be used instead of proprietary software or device-specific programming interfaces to manage devices that are compliant with the Common Information Model (CIM).

CIM object manager (CIMOM)The common conceptual framework for data management that receives, validates, and authenticates the CIM requests from the client application. It then directs the requests to the appropriate component or service provider.

cipherA cryptographic algorithm used to encrypt data that is unreadable until converted into plain data with a predefined key.

cipher block chaining (CBC)A method of reducing repetitive patterns in ciphertext by performing an exclusive-OR operation on each 8-byte block of data with the previously encrypted 8-byte block before it is encrypted.

A telecommunication circuit such as a line, conductor, or conduit through which information is transmitted.

circuit breakerA switch that automatically interrupts an electric circuit because of an abnormal condition.

circuit identification code (CIC)A 12-bit number that identifies a trunk and channel on which a call is carried.

circuit-switched data transmission serviceA service that uses circuit switching to establish and maintain a connection before data can be transferred between data terminal equipment (DTE). See also packet-switched data transmission service.

circuit switchingA process that, on demand, connects two or more data terminal equipment (DTEs) and permits the exclusive use of a data circuit between them until the connection is released. See also message switching, packet switching.

circuit typeA template that specifies the layout for the type of circuit or service.

circuit type identifierAn identifier for an unmatched circuit. The identifier is based on the criteria that is stipulated against a specific invoice format.

circular fileA type of file that appends data until full; subsequent incoming data overwrites the data starting at the beginning of the file.

circular layoutA layout in which entities are arranged by type around the circumference of a circle. See also layout.

circular logA database log in which records are overwritten if they are no longer needed by an active database. See also archive log.

circular loggingIn WebSphere MQ on UNIX and Linux systems and WebSphere MQ for Windows, the process of keeping all restart data in a ring of log files. See also linear logging.

circular referenceA series of objects where the last object refers to the first object, which can cause the series of references to be unusable.

circular traceability relationshipA relationship between a requirement and itself, or an indirect relationship that leads back to a previously traced-from node. Traceability relationships cannot have circular references.

A request for reimbursement, replacement, or repair for an item or an asset that is under warranty.

A notification to DB2 for z/OS that an object is being accessed. A claim prevents a drain from occurring until the claim is released, which usually occurs at a commit point. See also drain, logical claim.

claim classA type of object access that can be defined by one of the following characteristics: cursor stability (CS), repeatable read (RR), or write.

C languageA language used to develop application programs in compact, efficient code that can be run on different types of computers with minimal change.

class

A description of a set of objects that share the same attributes, operations, methods, relationships, and semantics. A class can use a set of interfaces to specify collections of operations that it provides to its environment. See also interface.

An attribute that is related to a transaction code and a message region that is used to determine scheduling. See also message class, region class.

An object that contains specifications, such as priority, maximum processing time, and maximum storage, to control the run-time environment of a job. The system-recognized identifier for the object type is *CLS.

A grouping of projects that has global properties. The properties are used to manage completed jobs, typically deleting them periodically or starting another job that performs specific cleanup tasks.

In the Distributed Computing Environment (DCE), a category into which objects are placed based on their purpose and internal structure.

In RACF, a collection of defined entities (users, groups, and resources) with similar characteristics.

A basic unit of the classification hierarchy used in the Type Designer. There are three classes: item, group, and category.

A collection of processes (and their associated threads) that have a single set of resource limitation values and target shares applied to them.

A section of a module. A class can represent program text, that is, the instructions and data that are loaded into virtual storage during execution. Other classes, such as an external symbol dictionary (ESD) and a relocation dictionary (RLD), are required for binding and loading the program.

The set of all members of a type of object, such as all contracts, term definitions, organizations, and so on.

A subdivision of a classification comprising of a group of suppliers that have common attributes or characteristics.

In object-oriented design or programming, a model or template that can be used to create objects with a common definition and common properties, operations, and behavior. An object is an instance of a class.

Connectionless service between ports with notification of delivery or nondelivery.

class 2 terminalA terminal for which IMS in the alternate reestablishes service at takeover.

class 3In fibre-channel technology, connectionless service between ports without notification of delivery. Other than notification, the transmission and routing of class 3 frames is identical to that of class 2 frames.

class 3 terminalA terminal that communicates with XRF IMS but whose sessions are not automatically reestablished at takeover.

class A networkIn Internet communications, a network in which the high-order (most significant) bit of the IP address is set to 0 and the host ID occupies the three low-order octets.

class assignment ruleA rule that determines which values within a set of process attributes result in a process being assigned to a particular class (superclass or subclass within a superclass).

class attributeA value in a class object that controls the processing of routing steps in a job. These values include the run priority, time slice, eligibility for purge, default wait time, maximum processing unit time, and maximum temporary storage parameters.

class authority (CLAUTH)An attribute that allows a user to define RACF profiles in a class defined in the class descriptor table. A user can have class authority to zero or more classes. See also authority.

class binding signatureA hexadecimal value that contains the class signature (obtained from the signature bank) and the inheritance level. The class binding signature is added to the Interface Definition Language (IDL) source file by the signature emitter.

class B networkIn Internet communications, a network in which the two high-order (most significant and next-to-most significant) bits of the IP address are set to 1 and 0, respectively, and the host ID occupies the two low-order octets.

Class Broker for Java (CBJ)A Java tool that allows Java applications to run on a host system that does not have a graphical user interface (GUI). Because the IBM Developer Kit for Java Remote Abstract Window Toolkit is not recommended for complex graphics or highly interactive operations, CBJ for high-performance GUI services can be used.

class C networkIn Internet communications, a network in which the two high-order (most significant and next-to-most significant) bits of the IP address are both set to 1 and the next high-order bit is set to 0. The host ID occupies the low-order octet.

class conditionIn COBOL, a condition that specifies the character content of a data item as all alphabetic or all numeric.

class descriptor table (CDT)A table containing a definition of general resource classes. The CDT contains the classes supplied by IBM and the installation-defined classes.

class diagramA diagram that shows a collection of declarative (static) model elements, such as classes, types, and their contents and relationships.

class FConnectionless service for inter-switch control traffic, which provides notification of delivery or nondelivery between two expansion ports (E_ports).

class fileA compiled Java source file.

class hierarchyThe relationships between classes that share a single inheritance.

classification valueA value within the classification hierarchy that can be associated to an item attribute.

classifiedPertaining to a record that has special access restrictions in addition to normal record security.

classifier

A specialized attribute used for grouping and color-coding process elements.

In QoS, a control function that selects packets according to the content within the packet headers.

An XPath expression that determines the transformation to apply to an inbound event.

class inheritanceA feature that allows a subclass to inherit all of the properties of a superclass, which is its parent in a class hierarchy.

class keyOne of the C++ keywords: class, struct, and union.

Classless Inter-Domain Routing (CIDR)A method for adding class C Internet Protocol (IP) addresses. The addresses are given to Internet Service Providers (ISPs) for use by their customers. CIDR addresses reduce the size of routing tables and make more IP addresses available within organizations.

class libraryIn object-oriented programming, a collection of prewritten classes or coded templates, any of which can be specified and used by a programmer when developing an application.

class loaderPart of the Java virtual machine (JVM) that is responsible for finding and loading class files. A class loader affects the packaging of applications and the runtime behavior of packaged applications deployed on application servers.

class maskA network mask that is derived solely on the basis of the network class of an Internet Protocol (IP) address.

class method

A method that creates class instances.

In Java, a method that is called without referring to a particular object. Class methods affect the class as a whole, not a particular instance of the class. See also instance method.

class name

A unique identifier of a class type that becomes a reserved word within its scope.

In the X Window System, the name of a class of resources, widgets, or clients. Resource and widget class names are typically defined in the programming libraries used to create the client.

class-nameIn COBOL, a user-defined word defined in the SPECIAL-NAMES paragraph of the Environment Division that assigns a name to the proposition, for which a truth value can be defined, to verify that the content of a data item consists exclusively of those characters listed in the definition of the class-name.

class objectAn object that identifies the run attributes of a job. The system-recognized identifier for the object type is *CLS.

class of service (COS)

A set of characteristics (such as route security, transmission priority, and bandwidth) used to construct a route between session partners. The class of service is derived from a mode name specified by the initiator of a session.

A VTAM term for a list of routes through a network, arranged in an order of preference for their use.

In fibre-channel technology, a specified set of delivery characteristics and attributes for frame delivery.

A set of link and node characteristics, associated with a session or a set of sessions, that determine the route that is selected for the sessions through an APPN network.

class-of-service databaseA database that is maintained independently by each network node, and optionally by APPN end nodes. The database contains one entry per class-of-service name. Each database entry contains: (a) A definition of the acceptable values for transmission group (TG) and node characteristics for routes described by that class-of-service name and the weight function to be used to compute the weights of nodes and TGs that meet the acceptable values; (b)The transmission priority to be used for traffic that flows on routes described by that class-of-service name.

class-of-service descriptionA system object created for Advanced Peer-to-Peer Networking (APPN) support that provides the information required to assign relative priority to the transmission groups and intermediate routing nodes for an APPN session. The system-recognized identifier for the object type is *COSD.

class pathA list of directories and JAR files that contain resource files or Java classes that a program can load dynamically at run time.

class signatureA hexadecimal value obtained from a server and placed in a signature bank on the workstation. The signature bank uniquely identifies an Interface Definition Language (IDL) interface. Class signatures are added to the IDL source file by the signature emitter.

class statisticsStatistical information that includes information such as the number of instances of the class in the application, the CPU time spent in that class, the number of calls made to the class, and so on.

class styleA combination of formatting characteristics, such as font, font size, and border, that the user names and stores as a set.

class templateA blueprint describing how a set of related C++ classes can be constructed.

class template declarationA class template declaration introduces the name of a class template and specifies its template parameter list. A class template declaration may optionally include a class template definition.

class template definitionA definition that describes various characteristics of the class types that are its specializations. These characteristics include the names and types of data members of specializations, the signatures and definitions of member functions, accessibility of members, and base classes. See also base class.

class tierIn AIX Workload management, the value that specifies which class is most important. If no tier value is used, all classes are equally important.

class transitionA change in an object's management class or storage class when an event occurs that brings about a change in an object's service level or management criteria. Class transition occurs during a storage management cycle.

clause

A set of conditions and variable expressions that represent specific layers in a protocol stack.

A building block of the contract language that may contain legal language or line data.

A set of consecutive character strings that specify a characteristic of an entry. There are three types of clauses: data, environment, and file.

In SQL, a distinct part of a statement in the language structure, such as a SELECT clause or a WHERE clause.

The fundamental grouping of REXX syntax. A clause is composed of zero or more blanks, a sequence of tokens, zero or more blanks, and the semicolon delimiter.

clause instanceAn occurrence of a clause in a contract where the term values are specific to the contract and the language of the clause may be modified to suit the current contract.

clause templateA template that contains the standard language of a clause and includes the legal language, terms, and other properties. See also template.

To transform the data extracted from operational systems to make it usable by a data warehouse.

To ensure that all values in a data set are consistent and correctly recorded.

clean upTo remove or delete obsolete repository data.

cleanupIn SNA products, a network services request, sent by a system services control point (SSCP) to a logical unit (LU), that causes a particular LU-LU session with that LU to be ended immediately without requiring the participation of either the other LU or its SSCP.

cleanup intervalThe length of time to wait before removing obsolete data.

cleanup periodThe time period during which a database record that has reached its final state or condition is to remain in the database. After the cleanup period expires for such a record, database cleanup causes the record to be deleted from the database.

cleanup procedureA procedure that instructs the system to attempt to remove software products that were partially installed and to revert to the previous version of the product. If the system successfully reverts to the previous version, it becomes the currently active version; otherwise, the software product is marked as broken.

clearIn X.25 communication, to reject a call (if it has not yet been accepted) or end a call.

clearanceThe control and positioning of plant equipment for providing protection for personnel and equipment during work on plant devices.

clear areaIn character recognition, a specified area that is to be kept free of printing or any other markings not related to machine reading. See also intercharacter gap.

In the Distributed Computing Environment (DCE), a collection of directory replicas on one Cell Directory Service (CDS) server. A clearinghouse takes the form of a database file. See also control access.

clearing taskA process of reviewing the registration submitted by a supplier and accepting or rejecting the supplier as per the business requirements.

clear key encryptionAny type of encryption key not protected by encryption under another key.

clear messageA message displayed by DirectTalk to tell the operator that a red or yellow error message has been cleared.

clear request packetA call supervision packet transmitted by a data terminal equipment (DTE) to ask that a call be cleared.

clear to send (CTS)In data communication, a signal raised by data circuit-terminating equipment (DCE) when it is ready to accept data, usually in response to request to send (RTS) being raised. See also request to send.

clear user dataIn X.25 communications, data optionally included in the clear-request packet by the user application.

clerical recordA record for which the matching process cannot definitively determine if the record is a duplicate record or a nonmatched record or if the record is a matched record or a nonmatched record. See also duplicate record, matched record, nonmatched record.

clerk

In the DCE Cell Directory Service (CDS), a software component that receives CDS requests from a client application, ascertains an appropriate CDS server to process the requests, and returns the results of the requests to the client application.

In the DCE Distributed Time Service (DTS), a software component that synchronizes the clock for its client system by requesting time values from servers, computing a new time from the values, and supplying the computed time to client applications.

C libraryA system library that contains common C language subroutines for file access, string operations, character operations, memory allocation, and other functions.

clickTo press and release a mouse button without moving the pointer off the choice.

clickstreamIn web advertising, the sequence of clicks or pages requested as a visitor explores a website.

Clickstream EngineThe Macromedia LikeMinds Personalization Server component that accesses transaction information and generates recommendations based on users' shopping behavior as they navigate a website. WebSphere Commerce generates events based on shopping behavior, including viewing a product detail page and adding items to a shopping cart or wish list. These events are forwarded to the Clickstream Engine.

clickthroughA marketing tool that reports the number of times a customer clicks on the displayed content to find out more information about the subject.

clickthrough rateIn web advertising, the number of clicks on an ad on an HTML page as a percentage of the number of times that the ad was downloaded with a page. See also impression.

Click-to-Action (C2A)A method for implementing cooperative portlets, whereby users can click an icon on a source portlet to transfer data to one or more target portlets. See also cooperative portlets, wire.

click-to-callA feature that allows a user to select two or more contacts and then call them at the same time, initiating an audio conference.

click-to-conferenceA Sametime Unified Telephony feature that allows a user to select two or more contacts and then call them at the same time, initiating a conference.

client acceptorA service that serves the Java applet for the web client to web browsers. On Windows systems, the client acceptor is installed and run as a service. On AIX, UNIX, and Linux systems, the client acceptor is run as a daemon.

An application written with object-oriented or Internet APIs to access content servers from Information Integrator for Content.

A storage management program that initiates Common Information Model (CIM) requests to the CIM agent for the device.

An application that users the services of the database services by direct connection or via application servers. See also client/server architecture.

An application, running on a workstation and linked to a client, that gives the application access to queuing services on a server.

An application written with the Content Manager APIs to customize a user interface.

A user application, written in a supported programming language other than Java, that communicates directly with the Client daemon.

Client Application for WindowsA complete object management system provided with Content Manager and written with Content Manager APIs. It supports document and folder creation, storage, and presentation, processing, and access control.

client contextIn the Distributed Computing Environment (DCE), the state within a Remote Procedure Call (RPC) server generated by a set of remote procedures and maintained across a series of calls for a particular client.

Client daemonA daemon that manages network connections to CICS servers. It processes ECI, EPI, and ESI requests, sending and receiving the appropriate flows from the CICS server to satisfy the application requests. The Client daemon (process cclclnt) exists only on distributed platforms.

client domainThe set of drives, file systems, or volumes that the user selects to back up or archive data, using the backup-archive client.

client end nodeAn end node for which the network node provides network services.

client frameworkA set of scripts that are deployed with a web application or mobile native application to capture user interactions on the client that would not otherwise require a server interaction. By capturing these user interface events, a client framework can provide unique insight into the activities of visitors within their browsing devices.

client groupA group of clients that specify the volumes that are backed up. Client groups can also include SQL and Exchange databases for backup, even if they span across multiple disk volumes.

client identifier (client ID)A piece of information that identifies an individual application. An application can invoke an API only if it passes an application key that is recognized by the IBM API Management system and is granted access to the API. The application key is passed by the client by using an HTTP query parameter.

client initialization fileA file containing configuration information used to inform the CICS Client of the CICS servers it can connect to, and the communication protocols to be used.

Client Input Output Sockets (CLIO/S)A set of commands and APIs that can be used for high-speed communication and to access tape devices on a network of AIX workstations and MVS mainframes.

client localeThe locale that a client application uses to perform read and write operations on the client computer. See also locale, server locale.

client logical partitionA logical partition that uses the I/O resources of another logical partition, for example, a logical partition that uses the resources of a Virtual I/O Server logical partition.

client messageA message from a client application that is to be sent by means of a network to its destination, or a message that is routed to a client application to acknowledge the receipt of a client message by a network.

client node

In a single system image (SSI), a WebSphere Voice Response system that handles interactions with callers. A client node must have a telephony connection. It does not store application or voice data; it gets data from the server node of the SSI.

A file server or workstation on which the backup-archive client program has been installed, and which has been registered to the server.

client node sessionA session in which a client node communicates with a server to perform backup, restore, archive, retrieve, migrate, or recall requests. See also administrative session.

client option setA group of options that are defined on the server and used on client nodes in conjunction with client options files.

client processA process that requests services from a server process. See also server process.

client program

In dynamic routing the application program, running in the requesting region, that issues a remote link request.

A program that uses a C++ class.

In the client/server model, the front-end transaction.

client project for RuleAppsA predefined project for Eclipse that contains a class to execute a ruleset within a RuleApp.

client proxyAn object on the client side of a network connection that provides a remote procedure call interface to a service on the server side.

client rerouteA method that allows a client application, upon the loss of communication with a database server and the predefinition of an alternative server, to continue working with the original database server or the alternative server with only minimal interruption of the work.

client scheduleA database record that describes the planned processing of a client operation during a specific time period. The client operation can be a backup, archive, restore, or retrieve operation, a client operating system command, or a macro. See also administrative command schedule, central scheduler, schedule.

client secretA piece of information that is used with an application key to verify the identity of an application. An API can be configured to require that client applications supply their application secret with their application key. The application secret functions effectively as a password known only to the application. The application secret is passed by the client using an HTTP query parameter.

client/serverPertaining to the model of interaction in distributed data processing in which a program on one computer sends a request to a program on another computer and awaits a response. The requesting program is called a client; the answering program is called a server. See also distributed application.

client/server architectureA hardware and software design that allows the user interface and database server to reside on separate nodes or platforms on a single computer or over a network. See also client application, server-processing locale.

client/server connection statementAn SQL statement that can connect to a database. These statements include CONNECT, DISCONNECT, and SET CONNECTION.

client sideIn an ebMS exchange, the partner using the service, or a service user.

client-sidePertaining to an operation that is performed on the client application and not on the server.

client-side human serviceA human service that runs in the web browser and can call the server to obtain data. A client-side human service can be used to implement an interactive task, a dashboard, or a user interface for a case or process instance that users can use to manage cases or processes in an application. See also heritage human service, human service.

client state manager

A station that consists of a control unit (a cluster controller) and the terminals attached to it.

A component of the client kernel that provides protocol support for the client.

client stubIn the Distributed Computing Environment (DCE), the surrogate code for a remote procedure call (RPC) interface that is linked with and called by the client application code. In addition to general operations such as marshaling data, a client stub calls the RPC runtime library to perform remote procedure calls and, optionally, to manage bindings.

client system-options fileA file, used on AIX, UNIX, or Linux system clients, containing a set of processing options that identify the servers to be contacted for services. This file also specifies communication methods and options for backup, archive, hierarchical storage management, and scheduling. See also client user-options file, options file.

client tierThe client programs and consoles that are used for development, administration, and other tasks for the InfoSphere Information Server suite and product modules and the computers where they are installed.

client timeThe time that it takes to process and display a web page in a browser.

client type detectionA process in which a servlet determines the markup language type required by a client and calls the appropriate JavaServer Pages file.

client user-options fileA file that contains the set of processing options that the clients on the system use. The set can include options that determine the server that the client contacts, and options that affect backup operations, archive operations, hierarchical storage management operations, and scheduled operations. This file is also called the dsm.opt file. For AIX, UNIX, or Linux systems, see also client system-options file. See also client system-options file, options file.

client workstationIn the NetView Graphic Monitor Facility, a workstation that depends on a server workstation to provide it with views and status information. A client workstation receives status information from the server workstation over an LU 6.2 session.

Clinical Context Object Workgroup (CCOW)A vendor independent standard, for the interchange of information between clinical applications in the healthcare industry.

cliticA word that syntactically functions separately but is phonetically connected to another word. A clitic can be written as connected or separate from the word it is bound to. Common examples of clitics include the last part of a contraction in English 'wouldn't' or 'you're'.

cliticizationThe process by which a complex word or expression is formed by attaching a clitic to another word. A common example of cliticization includes attaching a clitic to a verb, for example: "je t'aime" in French.

CLNS pathIn OSI, a path used when the connectionless-mode network service is used. Each CLNS path names data terminal equipment (DTE) to be used for outbound communication.

CLNS path maintenanceIn OSI, an option of whether or not to maintain a CLNS path to an adjacent node permanently (until OSI Communications Subsystem is restarted), or release the path when no active CLNS connection uses it. These connections include both network management and directory service connections and connections between customer programs.

CLNS path setIn OSI, a path set used when the connectionless-mode network service is used.

cloak optionA customization option that restricts access to selected information in the cube. The cloak option removes a category and its descendants from a dimension, but summarizes the values in the ancestor categories.

clobberTo delete a project and all of its associated jobs from the database.

clock (CLK)

In data communication, equipment that provides a time base used in a transmission system to control the timing of certain functions, such as sampling, and to control the duration of signal elements.

A device that generates periodic signals used for synchronization.

clock eventA special system event that is used to initiate a system-generated event.

clocking

In binary synchronous communication, the use of clock pulses to control synchronization of data and control characters.

In communications, a method of controlling the number of data bits sent on a communications line in a specified time.

clock timeThe elapsed time in real time. Clock time differs from CPU time as thread switches and process context switches introduce uncertainty in performance calculation; clock time does not account for this execution behavior.

clone

To prepare a reference computer and create a system profile ready for deployment. See also unattended setup.

To preserve the characteristics of the original but personalize instance-specific data. The result is a new instance of an entity (for example, of a virtual disk, a virtual computer system, or an operating system) rather than a backup of the original.

An identical copy of the latest approved version of a component, with a new unique component ID.

A copy of a volume on a server at a particular point in time. The contents of the copy can be customized while the contents of the original volume are preserved.

A copy of an application, created so that it can be customized while the original is retained.

An operation that enables an administrator to replicate profiles. This capability simplifies the task of creating multiple profiles with similar properties.

An identical copy of the data and configuration of a server at a particular point in time.

clone deviceA STREAMS device that returns an unused major or minor device when initially opened, rather than requiring the minor device to be specified by name in the open call.

cloned IMSplexA group of IMSs in a sysplex that share databases, queues, or both, and have identical resource definitions.

clone objectAn object that is associated with a clone table, including the clone table itself and check constraints, indexes, and BEFORE triggers on the clone table.

clone tableA table that is structurally identical to a base table. The base and clone table each have separate underlying VSAM data sets, which are identified by their data set instance numbers. See also base table.

close

To end an activity and remove that window from the display.

To end processing by ending the connection between the file and a program.

closed applicationAn application that requires exclusive use of certain statements on certain DB2 objects, so that the objects are managed solely through the external interface of that application.

closed-circuit television (CCTV)The use of video cameras to transmit a signal to a specific place, on a limited set of monitors.

closed registrationA registration process in which only an administrator can register workstations as client nodes with the server. See also open registration.

closed systemA system whose characteristics comply with proprietary standards and that therefore cannot readily be connected to other systems.

closed user group (CUG)In data communication, a group of users who can communicate with other users in the group, but not with users outside the group. A data terminal equipment (DTE) may belong to more than one closed user group. See also bilateral closed user group.

closed workstationA workstation that is unavailable to process work for a specific time, day, or period.

closenessA measure of how quickly an entity can use links to get access to other entities on an association chart. Closeness is one of the centrality measures used in social network analysis. See also centrality.

close timeThe time that is required to close an access point.

closing versionA reporting version that contains the reported values for a given period, plus one or more journal types.

closure lineIn the GDDM function, a line added by the system to enclose an area being filled with a pattern, in instances when the routines that precede the GSENDA routine fail to form an enclosed area.

cloudA network that delivers requested virtual resources as a service.

cloud applicationAn application that is extended to be accessible through the Internet. Cloud applications use large data centers and powerful servers that host web applications and web services.

cloud clientSoftware or hardware that is designed to deliver cloud services, or that relies on cloud computing to operate.

cloud computingA computing platform where users can have access to applications or computing resources, as services, from anywhere through their connected devices. A simplified user interface or application programming interface (API), or both, makes the infrastructure supporting such services transparent to users. See also off-premises.

cloud deploymentThe process of installing and configuring a software application and all of its components onto a virtual server. See also deployment.

cloud-enabledPertaining to a model or implementation of a public, private, or hybrid cloud environment.

cloud groupA collection of hypervisors from a single vendor.

cloud imageAn information technology (IT) resource that can be provisioned for use on a cloud.

cloud requestA description of resources to be provided by a cloud. Typically, a cloud request consists of a list of cloud images to be provided by the cloud and information about how those cloud instances are to be configured.

cloud serviceA service that provides software that is accessed on servers on the Internet rather than on on-premises servers at a company site.

cloud service provider (CSP)A service provider that offers storage or software services or solutions through a public, private, or hybrid cloud.

cloud storageA storage resource provided by a cloud, or the storage of data on virtual public or private servers in the cloud.

A set of independent systems or logical partitions (called nodes) that are organized into a network for the purpose of sharing resources and communicating with each other.

In WebSphere MQ, a group of two or more queue managers on one or more computers, providing automatic interconnection, and allowing queues to be advertised among them for load balancing and redundancy.

A group of appliances in which one appliance acts as the central appliance, and the other appliances act as its clients.

A collection of one or more servers within a cloud that provide a specific function.

A group of entities that have more connections to each other than to entities outside the group.

A group of two or more Domino servers that provides users with constant access to data, balances the workload among servers, improves server performance, and maintains performance when the size of an enterprise increases.

In IBM System Storage DS8000, a partition capable of performing all DS8000 series functions. With two clusters in the DS8000 storage unit, any operational cluster can take over the processing of a failing cluster.

Two or more connected copies of Sterling B2B Integrator that share a database.

A group of application servers that collaborate for the purposes of workload balancing and failover.

A loosely coupled collection of independent systems (or nodes) organized into a network for the purpose of sharing resources and communicating with each other. See also GPFS cluster.

A set of independent systems or nodes that are organized into a network. The purpose of the cluster is to define a set of resources, nodes, networks, and storage devices that will keep applications highly available.

In SNA, a group of stations that consist of a controller (cluster controller) and the workstations attached to it.

A group of servers connected by a network and configured in such a way that if the primary server fails, a secondary server takes over.

In Microsoft Cluster Server, a group of computers, connected together and configured in such a way that, if one fails, MSCS performs a failover, transferring the state data of applications from the failing computer to another computer in the cluster and reinitiating their operation there.

In Storwize® V7000, a pair of nodes that provides a single configuration and service interface.

A collection of complete systems that work together to provide a single, unified computing capability.

A data set defined to VSAM. A cluster can be a key-sequenced data set, an entry-sequenced data set, or a relative record data set.

A related set of search results and their associated online resources that is automatically created.

Cluster Aware AIX (CAA)A technology that builds clustering capabilities into the AIX operating system. This built-in clustering support provides commands and programming APIs to create a cluster from a group of AIX instances. CAA provides kernel-based heartbeat, monitoring, and event infrastructure.

cluster base tableIn the Netezza database, a table that is organized on one to four columns, which collocates rows of the table in the same disk extents to improve query performance.

cluster collection storeThe set of machines on which the shards that are associated with a search collection are physically located. See also search collection, shard.

cluster configurationA user definition of all cluster components. Component information is stored in the ODM. Components include cluster name and ID, and information about member nodes, network interface, and network modules. See also dynamic automatic reconfiguration.

cluster configuration dataThe configuration data that is stored on the cluster configuration servers.

cluster controllerA device that can control the input/output operations of more than one device connected to it.

cluster domainA virtual collection of physical elements such as computer systems and logical elements such as software instances that can provide services to a client as a single unit. See also cluster domain node.

clustered hash tableA mechanism to enable the replicating and sharing of data between cluster nodes.

clustered indexAn index whose sequence of key values closely corresponds to the sequence of rows stored in a table. The degree of correspondence is measured by statistics that are used by the optimizer.

clustered systemA collection of nodes that are placed in pairs (I/O groups) for redundancy, which provide a single management interface. See also cluster, GPFS cluster, system.

clustered trivial database (CTDB)A cluster implementation of the trivial database (TDB) used by Samba and other projects to store temporary data.

cluster entryA catalog entry that contains the following information about a key-sequenced or entry-sequenced Virtual Storage Access Method (VSAM) cluster: ownership, cluster attributes, and the cluster's passwords and protection attributes. A key-sequenced cluster entry points to both a data entry and an index entry; an entry-sequenced cluster entry points to a data entry only. See also alternate-index entry.

cluster eventAny state change in a resource that is defined to a cluster. A cluster event can be informational, such as a join adapter event which indicates that a failed adapter is now functional, or the event can be part of a recovery process, such as a node down event which includes the takeover of resources by a backup node. See also node down, node up.

Cluster featureA feature that provides four cable connections and allows up to four work stations to be attached to a 5251 Model 12 Display Station.

cluster hardwareHardware that is included in the cluster, such as disks and disk devices, processors, network interfaces, and networks.

cluster information base (CIB)A replicated store of cluster-related information. It typically includes static configuration data which defines the resources, cluster nodes, and constraints (or dependencies) in the cluster, as well as information about the current state of the cluster.

clustering

The process of grouping records together based on similarity. Similar records are labeled according to their group, so there is no predefined target field for the model to predict.

The ability to group independent systems to work together as a single system.

clustering indexAn index that determines how rows are physically ordered (clustered) in a table space. If a clustering index on a partitioned table is not a partitioning index, the rows are ordered in cluster sequence within each data partition instead of spanning the partitions.

cluster interconnect netnameThe IP address or host name of the interconnect used for high-speed communication between members, or between members and cluster caching facilities, in a DB2 instance.

cluster joiningThe process whereby additional nodes join an existing cluster when they can communicate with another active clustered node and can validate the node name and version compatibility.

cluster logA log that maintains a history of routine activities and error conditions that are generated by all metadata servers in the cluster.

cluster manager

A software daemon that runs on every node in the cluster and is responsible for responding to failures and coordinating recovery actions.

The node that monitors node status using disk leases, detects failures, drives recovery, and selects file system managers. The cluster manager is the node with the lowest node number among the quorum nodes that are operating at a particular time.

cluster memberAn identically configured copy of an object, such as an application server. Cluster members can be used for workload management purposes, for example, to support horizontal scaling and vertical scaling.

cluster membership listA set of cluster nodes that have been configured for a cluster.

cluster processor complex (CPC)The unit within a cluster that provides the management function for the ESS. It consists of cluster processors, cluster memory, and related logic.

cluster profile record (CPR)A set of data that describes the VSAM data sets of various control-interval sizes for the storage of documents.

ClusterProvenAn IBM designation that defines certain high-availability requirements that are applied to a software product either by itself or in combination with other software products. A solution that satisfies the technical criteria of these requirements can be validated with IBM and licensed to be marketed with IBM's ClusterProven trademark.

cluster queueA local queue that is hosted by a cluster queue manager, and defined as a target for messages being put from an application connected to any queue manager within the cluster. All applications retrieving messages must be locally connected.

cluster queue managerA queue manager that is a member of a cluster. A queue manager can be a member of more than one cluster.

cluster-receiver channel (CLUSRCVR)A channel on which a cluster queue manager can receive messages from other queue managers in the cluster, and cluster information from the repository queue managers.

cluster resourceAny part of the system that is available across multiple cluster nodes. The two types of system resources that can be resilient are the following: Objects that are kept up to date by using replication. A resilient application and its associated IP address, which can be switched.

cluster resource group (CRG)A collection of related cluster resources that defines actions to be taken during a switchover or failover operation of the access point of resilient resources. The group describes a recovery domain and supplies the name of the cluster resource group exit program that manages the movement of an access point.

cluster resource group manager (CRGM)A highly available client application that uses the integrated cluster resource services to configure, define, monitor, and administer a cluster of systems.

cluster-root containerA special container that is the root of the global file system.

cluster-sender channel (CLUSSDR)A channel on which a cluster queue manager can send messages to other queue managers in the cluster, and cluster information to the repository queue managers.

cluster serviceA Windows (TM) service that manages the cluster specific activities and is installed on each node of the cluster. The components of the Cluster service provide high availability, easy management and enhanced scalability for Windows.

cluster servicesThe high availability services, such as the cluster manager and other services running on the nodes, that monitor the cluster resources. The resources and data maintained on the cluster for access by clients and their applications are cluster services.

cluster snapshotAn ASCII file containing a record of the data that defines a particular cluster configuration. Applying a cluster snapshot can save and restore a particular cluster configuration.

cluster split eventAn event that occurs when one or more nodes that are actively running cluster services cannot communicate with other nodes that are also running cluster services.

cluster storage subsystemA group of clusters where each cluster consists of one or more logical partitions that have a shared storage pool.

Cluster Systems Management (CSM)Systems management software that is designed to scale to large-size clusters.

cluster takeoverThe process of the DB2 product taking over the ownership of a user-managed GPFS cluster.

cluster templateA template that defines the tiers for a cluster in a system. Tiers work together to create a cluster for a specific application environment, for example a GPFS application environment.

cluster topicAn administrative topic that is defined on a cluster queue manager and made available to other queue managers in the cluster.

cluster transmission queueA transmission queue that holds all messages from a queue manager destined for another queue manager that is in the same cluster. The queue is called SYSTEM.CLUSTER.TRANSMIT.QUEUE.

cluster virtual IP addressAn IP address that is shared between the primary or secondary host and the HA cluster.

cluster VLANThe virtual LAN that connects nodes to each other and to the management server through an Ethernet connection. Installation and administration tasks are done on the cluster VLAN.

CMIP servicesThe VTAM implementation of the Common Management Information Protocol (CMIP), which provides a common set of program services for application programmers to use in writing CMIP application programs. These services include controlling associations, converting basic encoding rules (BER) syntax, and validating protocols.

CMS extended parameter listA type of parameter list available in the CMS environment consisting of a string composed exactly as the user typed it at the terminal. There is no tokenization performed on the string.

CMS tokenized parameter listA type of parameter list available in the CMS environment consisting of 8-byte tokens, which are folded to uppercase and end with a double word of FF.

coachA user interface that can be created to collect input that is required for an underlying service.

coalescing intervalThe interval at which events are bundled. Event bundling occurs in 10 second intervals and begins with the first event that does not match any currently coalescing events. Within the coalescing interval, the first three matching events are bundled and sent to the event processor.

coarse-grainedPertaining to viewing a group of objects from an abstract or high level. See also fine-grained.

coated paperPaper to which a surface coating is applied to make it smooth.

coattailingThe concept of VTAM's writing PIUs to NCP and reading PIUs from NCP with a single channel program. The values coded for the DELAY keywords on the VTAM PCCU definition statement and the NCP LINE definition statement affect the degree of coattailing. A user can increase the probability of VTAM's writing and reading PIUs with a single channel program by adjusting these DELAY keywords. An increase in the degree of coattailing improves channel efficiency but may increase response time.

coaxial cableA cable consisting of one conductor, usually a small copper wire, within and insulated from another conductor of larger diameter, usually copper tubing or copper braid.

COBOL run unitA COBOL-specific term that defines the scope of language semantics. A COBOL run unit is equivalent to a Language Environment enclave.

COBOL wordIn COBOL, a character string of not more than 30 characters that forms a user-defined word, a system-name, or a reserved word.

COBPACKA collection of individual modules that are packaged into a single load module in order to reduce the time that would otherwise be needed to load the individual load modules.

cobrowsingThe interaction of multiple users sharing information about their individual web interactions. With this interaction users can share a view of the same web page simultaneously and share further interactions with the web page they are jointly viewing.

Code 39A bar code symbology characterized by a variable-length, bidirectional, discrete, self-checking, alphanumeric code. Three of the nine elements are wide and six are narrow. It is the standard for LOGMARS (the U.S. Department of Defense) and the AIAG.

codebaseWorks together with the code attribute in the APPLET tag to give a complete specification of where to find the main applet class file: code specifies the name of the file, and codebase specifies the URL of the directory containing the file.(Sun)

codec

A technology that compresses and decompresses data for the purpose of reducing the bandwidth required to send streaming data.

A program that can encode and decode a digital data stream or signal. In mobile computing, there are separate codecs for multimedia processing and voice processing.

code churnA report that shows the volume of changes in a project over time.

code completionA feature of many IDEs and text editors that predictively completes content (words, phrases, tags, and so on) while the user types.

coded characterA control or graphic character with its assigned code point.

coded character set (CCS)A set of unambiguous rules that establishes a character set and the one-to-one relationships between the characters of the set and their coded representations. See also invariant character set.

coded character set identifier (CCSID)A 16-bit number that includes a specific set of encoding scheme identifiers, character set identifiers, code page identifiers, and other information that uniquely identifies the coded graphic-character representation. See also binary string.

coded character set identifier 65534 (CCSID 65534)The coded character set identifier (CCSID) that is used to show that a CCSID value for data at this level of processing is not relevant. When CCSID 65534 (X'FFFE') is associated with data, a CCSID value for the data should be obtained from the tagged fields of elements that are at a lower level in the defined hierarchy. For example, a file has CCSIDs that are tagged for each individual field it contains. If the field is tagged with CCSID 65534, processing is based on the CCSIDs assigned to each individual field instead of the CCSID assigned to the file.

coded character set identifier 65535 (CCSID 65535)An identifier that is used to show that the associated data should not be processed as coded-graphic-character data. CCSID 65535 ( FFFF ) cannot be represented in long form. Data that is associated with CCSID 65535 should be interpreted as actual representation is unknown as defined in Character Data Representation Architecture-Level 2, IBM Registry. You cannot convert data that is associated with CCSID 65535 from one CCSID to another. The coded character set identifier (CCSID) that is used to show that data associated with the CCSID should not be processed as coded-graphic-character data.

coded fontIn AFP support, a font file that associates a code page and a font character set. For double-byte fonts, a coded font associates multiple pairs of code pages and font character sets.

coded font local identifierA 1-byte identifier that the Map Coded Font structured field assigns to each coded font it selects. The identifier is then specified in the text-control sequence that precedes the string of text to be printed with the particular font. See also local identifier.

coded font sectionA font character set and code page pair. A single-byte coded font consists of only one coded font section; a double-byte coded font can consist of more than one.

coded graphic characterA graphic character that has been assigned one or more code points within a code page.

coded graphic character setA set of graphic characters with their assigned code points.

coded graphic character set global identifier (CGCSGID)A 4-byte binary or a 10-digit decimal identifier consisting of the concatenation of a GCSGID and a CPGID. The CGCSGID identifies the code point assignments in the code page for a specific graphic character set, from among all the graphic characters that are assigned in the code page.

coded graphic character-set IDA 10-digit identifier (two 5-digit identifiers separated by a space) that is the combination of a graphic character-set ID and a code-page ID. See also code page ID.

coded imageIn computer graphics, a representation of a display image in a form suitable for storage and processing.

coded overlayAn overlay loaded in a printer in a coded format, rather than as a raster pattern. See also raster pattern overlay.

code element setThe result of applying rules that map a numeric code value to each element of a character set. An element of a character set may be related to more than one numeric code value but the reverse is not true. However, for state-dependent encodings the relationship between numeric code values to elements of a character set may be further controlled by state information. The character set may contain fewer elements than the total number of possible numeric code values; that is, some code values may be unassigned. X/Open.

code extension methodA method prescribed in an encoding scheme for representing characters that cannot be accommodated within the limits of the basic structure of the code. It prescribes a method to alter the interpretation of one or more code points that follow a prescribed single control character or a control sequence.

code generation templateThe mixed-mode source file that is used by a generic operator to generate specific customizations. See also generic operator.

code generatorThe part of the compiler that physically generates the object code.

code groupIn a computer security code system, an apparently meaningless sequence of letters, digits, or both, that represents a plaintext element, which may be a word, phrase, or sentence.

code injectionA technique that introduces new code into an application. Code injection can be used by an attacker to introduce code into a computer program to change the course of execution.

code list

One or many dynamic pairs of code values that contains sender code and receiver code. Each code pair has one description and up to four additional codes relating to the pair.

A list that contains codes corresponding to the services provided by service providers.

code list tableA repository for lists of codes that can further define fields.

code loadIn System Manager, the type of product load that contains all of the product code that does not require translation to other languages, such as the code for displays, menus, and messages. However, if a product is never going to be translated, the code may contain all the product code.

code page

An ordered set of up to 256 predefined display symbols. The first 32 code points of each code page are reserved for control codes and are the same for all code pages, leaving up to 224 distinct display symbols per page.

A specification of code points from a defined encoding structure for each graphic character in a set or in a collection of graphic character sets. Within a code page, a code point can have only one specific meaning. See also invariant character set.

A particular assignment of code points to graphic characters. Within a given code page, a code point can have only one specific meaning. A code page also identifies how undefined code points are handled. See also code point.

code page global identifier (CPGID)A 5-digit decimal or 2-byte binary identifier that is assigned to a code page. The range of values is 00001 to 65534 (X'0001' to X'FFFE').

code page IDA 5-digit registered identifier used to specify a particular assignment of code points to graphic characters. The code-page ID is the second part of the QCHRID system value or the CHRID parameter value. See also coded graphic character-set ID.

code point

A unique bit pattern that represents a character in a code page. See also code page.

In QoS, pertaining to a specific value in the Differentiated Services field of a data packet that signals to a network the behavior that is assigned to that packet.

For SNA alerts, a 1-or 2-byte hexadecimal code that designates a particular piece of text to be displayed at the focal point.

An identifier in an alert description that represents a short unit of text. The code point is replaced with the text by an alert display program.

A unique bit pattern defined in a code. Depending on the code, a code point can be 7-bits, 8-bits, 16-bits, or other. Code points are assigned graphic characters in a code page.

code respectIn programming, a feature that preserves the order of elements in the original code structure during code generation.

code serverA system that provides a code service for other computers on a network.

code unitThe fundamental binary width in a computer architecture that is used for representing character data, such as 7 bits, 8 bits, 16 bits, or 32 bits. Depending on the character encoding form that is used, each code point in a coded character set (CCS) can be represented by one or more code units.

codingThe process by which the responses to open-ended questions are sorted into categories.

coding variableA categorical variable that stores the responses to an open-ended question after they have been sorted into categories.

co-editTo collaborate on a single file with one or more other people. Updates to the file are made at the time that people make the edits, whether at the same time or different times.

coexistence

During migration, the state during which two releases exist in the same data sharing group.

The ability of two or more different versions of WebSphere MQ to function on the same computer.

The ability of two or more entities to function in the same system or network.

The state during which two QMF releases exist in the same database.

cognitive analyticsA set of technologies and processes that analyze data for the purposes of learning, contextualization, and making recommendations.

cognitive carA car that has the technology to predict vehicle malfunctions before they happen, divert drivers to less congested routes, and help reduce traffic accidents.

cognitive computingA category of technologies that uses natural language processing and machine learning to enable people and machines to interact more naturally to extend and magnify human expertise and cognition.

coherency checkVerification that the current state of an object satisfies the programmer-defined invariant properties of its class.

coherentPertaining to an object in which all data values satisfy the invariant properties. If any invariant property is not satisfied, the object is not coherent.

coherent cacheCache that maintains integrity so that all clients see the same data.

cohortA list of security tags that specify the level of user access to the row.

colA typesetter postprocessor that buffers typeset output so that printers and workstations that do not support backscrolling can print.

cold backupFor programs that are resident on backup systems, a configuration in which a copy of the program is installed for backup purposes, but has not been started. See also hot backup, warm backup.

cold projectA project that contains only a work breakdown structure and schedule that are imported from another project-scheduling tool.

cold queueA Common Queue Server (CQS) private queue type that contains in-doubt data objects for a client that had a cold start or a CQS that had a cold start.

cold standbyA recovery method in which backup servers with installed applications are in place and in a stopped state.

cold start

The starting of IMS when it is initialized for the first time or when some error condition prevents a warm or emergency restart. See also emergency restart, normal restart.

A method of starting CICS where all local resources are refreshed, but information relating to remote systems and resource managers is preserved.

A process by which DB2 restarts without processing any log records. See also warm start.

A process in which the system is initialized. All jobs that were active or in the job queue at the time of the cold start are removed from the system. See also warm start.

The process of starting a system or program using an initial program load procedure.

The process of starting an existing data replication configuration without regard for prior replication activity, causing reinitialization of all subscriptions.

collaboration

A diagram that shows the exchange of messages between two or more participants in a BPMN model.

The ability to connect customers, employees, or business partners to the people and processes in a business or organization, in order to facilitate improved decision-making. Collaboration involves two or more individuals with complementary skills interacting together to resolve a business problem. See also web-based editor.

collaboration areaA runtime instance of a workflow for a specific hierarchy or catalog. A collaboration area provides a staging area where entries from that container can be modified without affecting the original entry. These changes can be copied back to the original or discarded when the entry completes the workflow. Each collaboration area must be associated with a workflow (but not vice versa). See also container, workflow.

collaboration portfolioThe set of collaboration-based offerings and solutions within a brand unit or business unit. For example, IBM's collaboration portfolio includes IBM Connections, IBM Lotus Sametime Connect, and IBM SmartCloud and other applications.

collaboration serviceA service that connects customers, employees, or business partners to the people and processes in a business or organization, in order to facilitate improved decision-making.

collaborative filteringPersonalization technology that calculates the similarity between users based on the behaviors of a number of other people and uses that information to make recommendations for the current user.

Collaborative Lifecycle Management (CLM)The integration of products on Jazz technology to connect the work of analysts with development and test teams. These integrations provide a common approach to artifact linking, dashboards, security, and user interface frameworks.

collaborative planning, forecasting, and replenishment (CPFR)A concept that allows working together across the supply chain, using a set of process and technology models that are: open, yet allow secure communications; flexible across the industry; extensible to all supply chain processes; supportive of a broad set of requirements.

collaborative unitThe configuration of the part of a deployment environment that delivers required behavior to an application module. For example, a messaging collaborative unit includes the host of the messaging engine and deployment targets of the application module, and provides messaging support to the application module.

collapseTo compact a hierarchical view so that only higher levels or organization are displayed.

collapsed subprocessA subprocess that hides its flow details. The collapsed subprocess object has a marker that distinguishes it as a subprocess, rather than a task. The marker is a small square with a plus sign inside.

collate

To combine and arrange in order.

To determine the sorting order of strings of characters.

collateral damage potential (CDP)A measurement of the potential impact of an exploited vulnerability on a physical asset or on an organization.

collating element

The smallest entity used to determine the logical ordering of strings. A collating element consists of either a single character, or two or more characters collating as a single entity. The value of the LC_COLLATE category in the current locale determines the current set of collating elements. See also collating sequence.

One or more characters that match a sequence in a regular expression.

collating sequence

The sequence in which the characters are ordered for the purpose of sorting, merging, comparing, and processing indexed data sequentially.

The relative ordering of collating elements as determined by the setting of the LC_COLLATE category in the current locale. The character order, as defined for the LC_COLLATE category in the current locale, defines the relative order of all collating elements, such that each element occupies a unique position in the order.

An ordering assigned to a set of items, such that any two sets in that assigned order can be collated.

collation

The separation of storage types into general categories (i.e. pallet, case, and single unit) that require very different means of handling.

The logical ordering of characters and strings according to defined rules.

collation orderThe logical order that character-string values in a database are sorted and indexed by. The ordering is either based on the order of the code set or a locale-specific order.

collation tableA table that provides an ordered character set and character equivalence classes used by functions.

collatorA device that combines and arranges pages in order.

collect - credited to customer payment methodA payment method in which the consignee pays for the freight charges and is reimbursed by the shipper.

collection

A container that provides a single view of related resources.

An instance of a collection data type; a group of elements of the same data type stored in a SET, MULTISET, or LIST data type.

An abstract class without any ordering, element properties, or key properties.

A set of data sources and options for crawling, parsing, indexing, and searching those data sources.

Data obtained by a collector that represents the system status at a given point in time. Collections are timestamped and stored in a management collection object. See also schema.

In Ada language, the entire set of objects created by evaluation of allocators for an access type.

A group of objects that typically have similar performance, availability, backup, retention, and class transition characteristics. A collection is used to catalog a large number of objects which, if cataloged separately, could require an extremely large catalog.

A distinct named set of data that is associated with a case. For example, an ordered set of captured network packets.

The process of monitoring and storing application performance data, aggregating it to a time interval, and saving it into data files on the endpoint.

collection cursorA database cursor that has an IBM Informix ESQL/C collection variable associated with it and provides access to the individual elements of a column whose data type is a collection data type.

collection-derived tableIn Informix, a table that can be mapped to a transient table, and its elements can be mapped to rows of the transient table.

collection pageA type of page in the administrative console that displays a collection list of administrative objects. From this type of page, you can typically select objects to act on or to display other pages for.

collection point block (CPB)In the NetView Performance Monitor (NPM), a control block used to coordinate the collection of network and session data.

collection processing engine (CPE)An engine that performs collection processing through the combination of a collection reader, an optional CAS Initializer, an analysis engine, and one or more CAS Consumers.

collection processing manager (CPM)A module in the framework that manages the execution of collection processing, routing CASs from the collection reader to an analysis engine, and then to the CAS Consumers. The CPM provides feedback such as performance statistics and error reporting, and may implement features such as parallelization.

collection readerA component that reads documents from a source, such as a file system or database, and returns each document as a CAS that may be processed by analysis engines.

collection resourceA resource that provides access to information about a set of artifacts of the same type, such as jobs, operators, or processing elements.

Collection ServicesA System i Navigator tool that collects performance data independent of the system monitors in System i Navigator. This function is intended for subsequent analysis by performance personnel either by writing queries against the collected data or by reviewing reports produced by the Performance Tools for i5/OS licensed program.

collection variableAn IBM Informix ESQL/C host variable or SPL variable that holds an entire collection and provides access, through a collection cursor, to the individual elements of the collection.

collective

A set of Liberty servers in one management domain that has at least one server with the collective-controller feature enabled.

A set of appliances that are grouped together for scalability and management purposes.

collective communicationA communication operation that involves more than two processes or tasks. Broadcasts and reductions are examples of collective communication operations. All tasks in a communicator must participate.

collective controllerA centralized administrative control point where operations such as MBean routing, file transfer, and cluster management in a collective are performed. A core role of the collective controller is to receive information from the members within the collective so that the data can be retrieved readily without having to invoke an operation on each individual member.

collector

An object that determines what information is collected from, or assigned to, server resources. The information is specified through properties in the collector. The collector, assigned to a server, serves as a specification for the server’s manifest.

A web service that accepts uploads of recordings and stores them into a permanent storage medium. This web service is a component of the session recording server.

A generic name for a program that at regular intervals collects data about the status of the system.

In an AIX PowerSC environment, an AIX logical partition or a virtual machine that has VTPM enabled and has the OpenPTS.collector fileset installed.

collector systemFor directory shadowing, a system that receives initial or changed Enterprise Address Book (EAB) data from a supplier system in a network. See also supplier system.

collect payment methodA payment method in which the consignee pays for the freight charges.

collision

In X.25 communication, a condition that occurs when data terminal equipment (DTE) and data circuit-terminating equipment (DCE) simultaneously transmit packets (for instance, a clear request packet and a clear indication packet) over the same logical channel. The types of collision are clear collision, call collision, or reset collision.

An unwanted condition that results from concurrent transmissions on a channel, causing the transmissions to be unintelligible.

collision arbiterA plug-in that specifies how to handle change collisions in map entries.

collision avoidanceIn carrier sense multiple access with collision avoidance (CSMA/CA), the process of sending a jam signal and waiting for a variable time before transmitting data. The process is designed to avoid two or more simultaneous transmissions.

collision detectIn Performance Tools, a counter that counts the total number of times the terminal equipment (TE) detected that the frames it transmitted were damaged by another TE trying to use the same bus.

collision detectionIn carrier sense multiple access with collision detection (CSMA/CD), a signal indicating that two or more stations are transmitting simultaneously.

collocated joinThe result of two tables being joined under one of two conditions. The first condition is where the tables are located in a single-partition database partition group in the same database partition. The second condition is where the tables are in the same database partition group, the number of partitioning columns is the same, the columns are partition compatible, both tables use the same partitioning function, and pairs of the corresponding partitioning key columns participate in the equijoin predicates. See also partition-compatible join.

collocation

The process of keeping all data belonging to a single-client file space, a single client node, or a group of client nodes on a minimal number of sequential-access volumes within a storage pool. Collocation can reduce the number of volumes that must be accessed when a large amount of data must be restored. See also anti-collocation, distribution preference.

An optional policy which can be applied to certain cluster resources such as persistent IP addresses and resource groups. Collocation specifies that, whenever possible, the entity will be brought online using the same resources as another cluster entity. For example, if a persistent IP address is configured to collocate with a service IP address, the persistent and service IP addresses will both be placed on the same network interface. See also anti-collocation, distribution preference.

collocation frequencyA statistic that indicates the likelihood of certain words occurring together in text.

collocation groupA user-defined group of client nodes whose data is stored on a minimal number of volumes through the process of collocation.

colon formatA format into which data files can be organized. Each data record consists of one line in the colon file, and data fields in each data record are separated by colons.

colonyIn Sterling Order Management and Sterling Configure, Price, Quote, a set of database shards required to provide complete sharding functionality.

colony address spaceAn address space in which a physical file system (PFS) can be initialized. The address space can be viewed as a logical extension to the kernel address space.

colorIn computer systems, a color is usually represented by a triplet called RGB (red, green, and blue) signals. Most computer monitors require RGB signals to drive the 3-colored phosphors of a color monitor.

color attributeAn attribute that affects the color values provided in a graphics primitive, a text control sequence, or an IPDS command; for example, foreground color and background color.

color cellIn Enhanced X-Windows, an entry in a color map that consists of three values based on red, green, and blue intensities. The values are 16-bit, unsigned numbers. Zero represents the minimum intensity. The values are scaled by the server to match the particular display in use.

color depthThe number of screen colors that are available to visitors that are accessing a website.

color displayA display device capable of displaying more than two colors and the shades produced by combinations of two colors, as opposed to a monochrome display.

A set of color cells. A pixel value indexes the color map to produce RGB-intensities. A color map consists of a set of entries defining color values that, when associated with a window, is used to display the contents of the window.

A lookup table in which each index is associated with a red, green, and blue value.

color mapping fileFile CICSCOL.INI used by the CICS Transaction Gateway to customize the 3270 screen color attributes on client workstations.

color mapping tableAn architected MO:DCA object that is used to map color values specified in a source color space to color values specified in a target color space. This object is loaded into printers that support the color mapping table.

color modelA technique for describing a color. For example, the RGB color model specifies color in terms of three intensities for red (R), green (G), and blue (B).

color palette

A set of colors that can be displayed on the display at one time. This can be standard set used for all images or a set that can be customized for each image.

In Business Graphics Utility, the range of colors defined by hue, lightness, and saturation to be used when a chart is displayed on a graphics-capable display.

color rampA progression of colors in a color map. Most color ramps are smooth and have only a small number, if any, of discontinuities. For instance, if the full set of colors of the rainbow were loaded into the color map, that would constitute a color ramp.

color selectionThe ability to specify a color other than black to print data in more than one color. Some printers support selection of several colors, depending upon the color of ribbon installed in the printer. Other printers support the selection of black or "color of media," which can cause white lettering on a background that has been shaded black, for example.

color separationThe process of making separate masters of a document for color printing.

In AFP architecture, a collection of color element sets. The table can also specify the method used to combine the intensity levels of each element in an element set to produce a specific color. Examples of methods used to combine intensity levels are the additive method and the subtractive method. See also lookup table.

column

In a relational database, a field defined for a given record or row.

A subdivision of a band, such as baseline or actual.

A character position within a print line or on a display. The positions are numbered consecutively from 1, starting at the leftmost character position and extending to the rightmost position.

The vertical component of a database table. A column has a name and a particular data type (for example, character, decimal, or integer).

In FD:OCA, a subarray consisting of all elements that have an identical position within the low dimension of a regular two-dimensional array. See also row.

column analysisA data quality process that describes the condition of data at the field level.

columnar vector memorySort heap memory that is used in the vector processing of data that is stored in column-organized tables.

column balancingThe process of redistributing lines of text among a set of columns so that the amount of text in each column is as equal as possible.

column compression dictionaryA column-level dictionary that is used to compress data in a column of a column-organized table.

column constraintA rule that limits the values that can be inserted, deleted, or updated in a table column.

column dataThe data in a column of a relational database table or view. The type of the data can be any data type supported by the database manager.

column headingText appearing near the top of a column of data for the purpose of identifying or titling the data in the column.

column inchA unit of measure for printed text. One column inch is the amount of text contained in an inch of type depth, one column wide.

column-major orderA way of storing array elements such that the leftmost subscript varies most rapidly as memory-adjacent elements are accessed.

column mapA map that defines the specifications for mapping columns of compatible data between source and destination tables.

column optionIn a federated system, a parameter of the CREATE NICKNAME and ALTER NICKNAME statements that describes the values in certain columns of the data source object that a nickname references. This information is added to the global catalog and used by the query optimizer to develop better access plans.

column positionA unit of horizontal measure related to characters in a line. It is assumed that each character in a character set has an intrinsic column width independent of any output device. Each printable character in the portable character set has a column width of one. The standard utilities, when used as described in this document set, assume that all characters have integral column widths. The column width of a character is not necessarily related to the internal representation of the character (numbers of bits or bytes). The column position of a character in a line is defined as one plus the sum of the column widths of the preceding characters in the line. Column positions are numbered starting from 1. X/Open.

column separatorA symbol on each side of a position of a field on a display. This symbol does not occupy a position on the display.

column tokenA level attribute that has certain properties, irrespective of the reference structure level. For example, the level attribute that provides the identifier for each row of data is represented by the $ID column token.

column widthThe width of each text column on a page.

column wrappingThe formatting of values in a report so that the values occupy several lines within a column. Column wrapping is often used when a column contains a value with a length that exceeds the column width.

combIn a magnetic disk unit, an assembly of access arms that moves as a unit.

combination boxA control that combines the capabilities of an entry field and a list box. The list box contains choices that a user can select from to complete the entry field.

combination couponA coupon that is used to make price adjustments.

combination pricing ruleA pricing rule that changes the price of an item based on the combination of items being ordered. For example, an organization can create a pricing rule under which, for every home theatre system a customer buys, the customer gets a free DVD player.

combined alertIn the NetView program, an alert that includes both a nongeneric alert and a generic alert in one network management vector transport.

combined conditionIn COBOL, a condition that is the result of connecting two or more conditions with the AND or the OR logical operator.

combined fileIn RPG, a data file that is used as both an input file and an output file. The fields are not necessarily the same in the input and output records.

combined function IOP (CFIOP)A type of IOP that can connect to a variety of different input/output adapters to support disk units, a console, and communications hardware. It contains some multifunction IOP (MFIOP) capabilities as well as Ethernet and token-ring controllers. This processor does not contain server processor functions. See also multifunction IOP.

combined searchA query that combines one or more of the following types of searches: parametric, text, or image.

combined sewer overflow (CSO)A discharge of untreated waste water from a combined sewer system at a point prior to the headworks of a publicly owned treatment works. CSOs generally occur during wet weather (rainfall or snowmelt). During periods of wet weather, these systems become overloaded, bypass treatment works, and discharge directly to receiving waters.

combined sewer system (CSS)A waste water collection system which conveys sanitary waste waters (domestic, commercial and industrial waste waters) and stormwater through a single pipe to a publicly owned treatment works for treatment prior to discharge to surface waters.

combined stationIn high-level data link control (HDLC), the part of a data station that supports the combined control functions of the data link, generates commands and responses for transmission, and interprets received commands and responses.

combining sequenceA single UNICODE character that is the combination of multiple characters with unique code point values.

COM componentA binary file, such as .dll, .ocx, and some .exe files, that supports the COM standard for providing objects. COM components contain code for one or more class factories, COM classes, registry-entry mechanisms, loading code, and so on.

A token that represents a separator of arguments in an argument list or decimal separator.

A unique pattern (either binary 1100000 or binary 0011111) used in 8B/10B encoding to specify character alignment within a data stream. See also K28.5.

comma-delimited fileA file whose records contain fields that are separated by a comma.

comma expressionAn expression that contains two operands separated by a comma. Although the compiler evaluates both operands, the value of the right operand is the value of the expression. If the left operand produces a value, the compiler discards this value.

command

A statement used to initiate an action or start a service. A command consists of the command name abbreviation, and its parameters and flags if applicable.

In SNA, any field set in the transmission header (TH), request header (RH), or request unit (RU) that states an action or that starts a protocol. See also data traffic reset state.

A request to perform an operation or run a program. When parameters, arguments, flags, or other operands are associated with a command, the resulting character string is a single command.

In SDLC, a frame transmitted by a primary station. Asynchronous balanced mode stations send both commands and responses. See also response.

A request from a terminal or automated operator for the performance of an operation or service, or for the execution of a particular program. See also response.

In data communication, an instruction represented in the control files of a frame and transmitted by a primary or combined station. It causes the addressed station to run a data link control function.

command aliasAn abbreviation of a long command line or a new name for a command. [OSF]

command and response token (CART)An 8-byte token that is added to write-to-operator (WTO) commands; it enables the response WTO to be associated with the command that invoked it.

command areaAn area of a display screen in which the user enters commands.

command attention key (CA key)In DDS, a keyboard key that can be specified with the CA keyword to request the function specified by the keyword. Data is not returned to the system. See also command function key.

command bagIn the MQAI, a type of bag that is created for administering WebSphere MQ objects, but cannot change the order of data items or create lists within a message.

command bean

A bean that contains the programming logic to handle a particular request.

A proxy that can invoke a single operation using an execute() method.

command bufferA temporary storage area where commands are stored before being carried out.

Command Center

A menu from which a user can carry out tasks and monitor the status for companies and groups.

A component of the Control Center for IMS that is used to issue IMSplex commands from both a workstation or multiple IMS systems.

command codeThe portion of the segment search argument that enables an application program to access a database segment based on some variation in either the call function, the segment qualification, or the setting of parentage.

command control block (CCB)In the IBM Token-Ring Network, a specifically formatted block of information provided from the application program to the adapter support software to request an operation.

command definitionAn object that contains the definition of a command (including the command name, parameter descriptions, and validity-checking information) and identifies the program that performs the function requested by the command. The system-recognized identifier for the object type is *CMD.

command definition statementA source statement that defines keywords and parameter values, qualified names, elements in a list, parameter requirements and interrelationships, and prompt text for a command. Command definition statements are used to create a CL command.

command directionAn RRSF function that allows a user to issue a command from one user ID and direct that command to run in the RACF address space on the same system or on a different RRSF node, using the same or a different user ID. See also automatic command direction, directed command.

command entry fieldIn Common User Access (CUA) architecture, an entry field in which a user types commands.

command eventA notification that an MQSC or PCF command has run successfully.

Command Execution Language (CEL)The language used to create commands that work across cluster nodes. C-SPOC commands use CEL.

command execution managerThe service that manages remote command execution through a function in the policies.

command facilityIn Tivoli NetView for OS/390, the component that is a base for command processors that can monitor, control, and automate network operations.

command file

In PC operating systems, a file with a file name extension of .CMD that functions like a batch file in DOS.

In RJE, a remote job input stream that can contain host system commands and job control language (JCL), data, and RJE control statements (READFILE or EOF). See also data file.

A system file that contains one or more statements or commands.

command frameA link-level frame or packet that is serviced as a command and (in most cases) expects a response.

command function key (CF key)In DDS, a keyboard key that can be specified with the CF keyword to request the function specified by the keyword. Data is returned to the system. See also command attention key.

command historyAn automatic listing of previously issued commands.

command indicatorIn the NetView Graphic Monitor Facility, a numeric identifier that is assigned to a network resource by its controlling resource manager. Each resource manager is assigned a range of values that can be defined.

command interfaceAn interface for running QMF commands. The QMF commands can only be issued from within an active QMF session. See also callable interface.

command key indicatorIn RPG, an indicator defined to correspond with the function keys to tell the program when one of the function keys is pressed.

Command Language (CL)In WebSphere MQ for iSeries, a language that can be used to issue commands, either at the command line or by writing a CL program.

command language interpreterA program that reads commands and changes them into computer instructions.

command language translatorA batch program (part of CICS program preparation utilities) that prepares a source application program that includes EXEC CICS or EXEC DLI commands. The translator program translates the EXEC commands into CALL statements in the language of the application program. The translator output can be compiled or assembled in the usual way.

command lengthIn query management, one of the arguments passed to the language-specific interface programs that specifies the length of the query command to be run.

command-levelPertaining to an operation that is performed for a specific command in a program. For example, a Monitor Message (MONMSG) command that immediately follows a specific command in a CL program is a command-level MONMSG command. See also program level.

command-level interpreterA transaction that enables CICS commands to be entered, syntax-checked, and executed interactively at a 3270 screen. It provides a reference to the syntax of the whole of the CICS command-level application programming and system programming interface.

command lineThe blank line on a display where commands, option numbers, or selections can be entered.

command-line argumentA part of a command line, delimited by white space. Arguments are used to specify detailed behavior to a program. They are usually either command line options selecting variations in program operation, or path names of files to be processed.

command-line clientA component used to run selected Tivoli Workload Scheduler master domain manager commands from any workstation where it is installed. The command-line client does not need to be installed on the master domain manager and is a selectable option for installation on other nodes in the network. See also master domain manager.

A list of commands and statements designed to perform a specific function for the user.

A language for performing TSO tasks.

command masterIn an IMSplex, the IMS that Operations Manager (OM) designates to process a command when a command is issued through the OM API. Commands are routed to all IMS systems that are registered for the command and, if the command requires only one IMS to process it, the command master processes the command.

command modeA state of a system or device in which the user can enter commands.

command nameThe first term in a command, a verb, which specifies the action to be performed and is usually followed by operands.

command prefix

A 1-character to 8-character command identifier. The command prefix distinguishes the command as belonging to an application or subsystem rather than to z/OS.

In WebSphere MQ for z/OS, a character string that identifies the queue manager to which WebSphere MQ for z/OS commands are directed, and from which WebSphere MQ for z/OS operator messages are received.

command prefix facility (CPF)A z/OS facility that provides a registry for command prefixes. CPF ensures that two or more subsystems do not have the same or overlapping command prefixes for operator commands.

command procedureIn the NetView for z/OS, a command list or a command processor that is written in a high-level language or a pipeline.

command processing clientAn entity that can process commands or perform other work as directed by an Operations Manager (OM). In an IMSplex, an IMS control region is a command processing client.

command processing program (CPP)A program that processes a command. This program performs some validity checking and processes the command so that the requested function is performed.

command processorA module designed to perform a specific function for the user. Users can write command processors in assembler language or in a high-level language. Command processors are started as commands.

command programming languageA facility with which a user can program by combining commands rather than by writing statements in a conventional programming language.

command promptA displayed character (or string of characters) that indicates that a user may enter a command to be processed.

command recognition character (CRC)

In MVS, a character that denotes an operator command.

A character that permits a z/OS console operator or an IMS subsystem user to route DB2 commands to specific DB2 for z/OS subsystems.

command scopeThe breadth of the impact of a command in a data sharing group. In a data sharing environment, a command can have a group scope or a member scope.

command securityA form of security checking that can be specified for the PERFORM, COLLECT, DISCARD, INQUIRE, and SET commands. Command security operates in addition to any transaction security or resource security specified for a transaction. For example if a terminal invokes a transaction that the user is authorized to use, and the transaction issues a command that the user is not authorized to use, the command fails with the NOTAUTH condition.

command-set vectorIn architecture, information that identifies an IPDS command set and data level supported by a printer. Command-set vectors are returned with an Acknowledge Reply to an IPDS Sense Type and Model command.

command significant statusThe command status that is associated with a resource, for example, the status of STOP, TRACE, and MFSTEST commands. If a resource structure is defined, the recovery of command significant status is always maintained globally by the Resource Manager (RM) in the resource structure. See also end-user significant status.

command string

In query management, a character string that contains a query command.

A request to perform an operation, along with the operands that provide all instructions needed for running the operation.

command substitutionIn UNIX-based operating systems, a shell feature that makes it possible to use the output from one command as an argument to another command.

command synonymThe verb or verb/object portion of a site-defined command. After command synonyms are defined and activated in the QMF profile, users can enter the synonyms on the QMF command line as they do with regular QMF commands.

command synonym tableA table that stores one site-defined command in each row. A set of command synonyms is assigned to a user by storing the name of this table in the user's profile.

command threadA thread which is reserved by the CICS DB2 attachment facility for commands issued to DB2 using the DSNC transaction. See also entry thread, pool thread.

command wordThe name of the 16-bit units used for storing graphic primitive strings. The first command word determines the primitive type and sets the length of the string.

comment-entryIn COBOL, an entry in the Identification Division of the source program that may be any combination of characters from the character set of the computer. The comment-entry is written in area B on one or more lines. Comment-entries serve only as documentation and are not translated by the compiler.

comment lineIn COBOL, a source program line represented by an asterisk (*) in the indicator area of the line and any characters from the computer's character set in area A and area B of that line. The comment line serves only for documentation in a program.

Commerce Composer toolA Management Center feature that business users can use to create pages and build page layouts for an e-commerce store without involving IT. The Commerce Composer tool provides a library of prebuilt layout templates and widgets to give business users greater control over page design.

Commerce Composer widgetA small application that retrieves and displays a specific type of content on a page of an e-commerce store. Examples of content are ads, product recommendations, and navigational links. In the Commerce Composer tool in Management Center, business users can design store pages by adding widgets to page layouts.

commercial addressThe street address as defined by the freight carrier for commercial sites.

commercial invoiceA list of the pertinent information about a shipment, such as shipper, consignee, third party (if present), the goods being shipped, their cost and value for customs (and for the transaction), and so on.

commercial processing workload (CPW)An application that is run on System i models and processors to determine processor performance. The CPW workload is representative of commercial applications, particularly those that do significant database processing in conjunction with journaling and commitment control.

To transfer to a specific version of the software product. When committing, the saved files from all previous versions are removed from the system, thereby making it impossible to return to a previous version without reinstallation. Committing does not change the currently active version of the software product.

To apply all the changes made during the current unit of recovery (UR) or unit of work (UOW). After the operation is complete, a new UR or UOW can begin.

A snapshot of the current state of a project in a repository. A project's history is defined by a series of commits.

To make a document immutable.

To end a unit of work by releasing locks so that the database changes made by that unit of work can be perceived by other processes. This operation makes the data changes permanent. See also atomic, recoverable data set.

commit cycleThe sequence of changes made between commitment boundaries.

commit cycle identifierThe journal sequence number associated with the start commitment operation that is used to identify the journal entries in a particular commit cycle.

commit identifierThe information that associates the commit operation with a specific set of committable resource changes. The commit ID is placed in the notify object if a system or routing step failure occurs, or if uncommitted changes exist when a routing step ends normally. The commit ID contains information (supplied on the commit statement) about the last successful transaction (group of changes that appear as a single change); for example, the transfer of funds from savings to a checking account.

commit in progress (CIP)The commit in progress logical unit of work (LUW) state indicates that all the resources associated with this logical unit of work have been prepared after a unanimous vote to commit. The protected resource managers are in the process of committing.

commitment boundary

In a commitment controlled environment, any time there are no outstanding changes for a committable resource existing within a job.

A point at which there are no changes to a database file pending within a job. See also roll back.

commitment control

A way of grouping file operations that allows the processing of a group of database changes as a unit or the removal of a group of database changes as a unit. See also roll back.

A means of grouping committable resource operations to allow either the processing of a group of committable resource changes as a single unit through the Commit command, or the removing of a group of committable resource changes as a single unit through the Rollback command.

commitment definitionInformation used by the system to maintain the commitment control environment throughout a routing step and, in the case of a system failure, throughout an IPL (initial program load). This information is obtained from the Start Commitment Control (STRCMTCTL) command, which establishes the commitment control environment, and the file open information in a routing step. The commitment definition has a scope either to the job or to a particular activation group within the job.

commit operation

An operation that saves a file to permanent storage.

A change management operation that causes all the updates prepared in the preparation phase to take effect. See also transactional mode.

commit phaseThe second phase in a XA process. If all participants acknowledge that they are prepared to commit, the transaction manager issues the commit request. If any participant is not prepared to commit, the transaction manager issues a back-out request to all participants.

committable resourceA local or remote i5/OS object that can be placed under commitment control.

committable updateAn operation that results in a change to an object such that the object is under commitment control.

committed changeA change that is not backed out in the event of a failure. Changes made by a logical unit of work (LUW) are committed when the sync point at the end of the LUW is complete.

committed copy counterA counting device that identifies the number of copies of a page that have been committed to printing but have not been counted by the committed page counter.

committed dateA date on which the supplier agrees to send the shipment to the buyer after a purchase order (PO) is placed.

committed page counterA counting device that identifies the number of pages that have been committed to printing and have been removed from the page buffer.

committed readIn Informix, an isolation level under which a query in a transaction can read only rows that are committed at the moment when the query is requested. The user cannot view rows that were changed as a part of a currently uncommitted transaction. Committed read is available through a database server and set with the SET ISOLATION statement. It is the default level of isolation for databases that are not ANSI compliant. See also read committed, uncommitted read.

commoditizationThe process by which goods and services that were once unique offerings become more generic in the marketplace. Commoditization occurs when the goods or services can be produced on a larger scale by more companies.

commodityA procurement entity representing a product or service that can be purchased and tracked throughout its lifecycle in the procurement process.

common agentAn agent that provides shared infrastructure for management applications. The common agent is self-monitoring and self-starting, and provides remote deployment capability, shared machine resources, secure connectivity, and a single entry point. See also agent, subagent.

Common Alerting Protocol (CAP)A simple but general format for exchanging all-hazard emergency alerts and public warnings over all kinds of networks.

commonalityIn information analysis, a measure of the number of matching values in a set of paired columns.

common analysis structure consumerA consumer that does the final processing on the analysis results that are stored in the common analysis structure. For example, a consumer indexes the contents of the common analysis structure in a search engine or it populates a relational database with specific analysis results. See also common analysis structure.

common analysis structure initializerA component that populates a Common Analysis Structure from a raw document. For example, if the document is HTML, a CAS Initializer might store a detagged version of the document in the CAS and also create inline annotations derived from the tags. See also common analysis structure.

common analysis structure processor (CAS processor)A component that takes a common analysis structure as input and returns a CAS as output. See also common analysis structure.

common anchor area (CAA)Dynamically acquired storage that represents a z/OS thread. This area acts as a central communications area for the program, holding control blocks and addresses of various storage and error-handling routines, and control blocks.

common area

A control section used to reserve a virtual storage area to which other modules can refer.

In a web page that is based on a page template, the fixed region of the page.

Common Base EventA specification based on XML that defines a mechanism for managing events, such as logging, tracing, management, and business events, in business enterprise applications. See also situation.

common blockIn FORTRAN, a storage area that can be referred to by a calling program and one or more subprograms.

Common Business Oriented Language (COBOL)A high-level programming language that is used primarily for commercial data processing.

common channel signaling (CCS)A method of communicating telephony information and line signaling events (for example, call setup and call clearing) on a dedicated signaling channel. See also channel associated signaling.

common client interface (CCI)A standard interface that allows developers to communicate with enterprise information systems (EISs) through specific resource adapters, using a generic programming style. The generic CCI classes define the environment in which a J2EE component can send and receive data from an EIS.

common codeA value that enables a user to choose from options rather than having to enter data manually.

common communication layer (CCL)The communication infrastructure that unites the various components, such as controller, parser, crawler, and index server, of WebSphere Information Integrator OmniFind Edition.

Common Communications Support (CCS)The Systems Application Architecture (SAA) component that defines architectures and protocols that interconnect systems and devices in an SAA environment and allow data to be interchanged among them.

common componentA component that is intended to be used in more than one product. See also assembly.

Common Console Interface (CCI)The interface definition that enables console components to run either in a previously installed console or in a web console, such as the Integrated Solutions Console (ISC).

Common CriteriaA framework for independent assessment, analysis, and testing of IT products to a set of security requirements.

Common Cryptographic Architecture (CCA)IBM software that enables a consistent approach to cryptography on major IBM computing platforms. It supports application software that is written in a variety of programming languages. Application software can call on CCA services to perform a broad range of cryptographic functions, including DES and RSA encryption.

Common Data Link Interface (CDLI)The device drivers that interface with kernel services to provide support for sockets and STREAMS interfaces.

Common Data ModelA logical data model that defines the standard representation of resources and how those resources are associated to each other. The Common Data Model uses influences from various standards bodies in the industry and serves as a best practice conglomeration of all standards.

common data set descriptor record (CDD)The record that precedes a user's data set on a DFSMShsm-owned volume and that is used to return the data set to the user's format.

common development test (CDT)A development and test environment for GNA/GWA applications, designed and built in accordance with customer requirements and GWA and GNA standards.

common domainIn information analysis, the set of columns that share overlapping and potentially redundant values.

common error bucketAn additional error status element (ESE) generated for each terminal error block (TEB), if fewer ESEs than the maximum number of error types recognized by the CICS terminal abnormal condition program are specified when the terminal error program (TEP) tables are generated.

Common Event Infrastructure (CEI)The implementation of a set of APIs and infrastructure for the creation, transmission, persistence, and distribution of business, system, and network Common Base Events. See also event emitter.

common filter serviceA subcomponent of DFSMSdfp common services that compares data items with filter keys, and then indicates which data items match the keys and how many matches have been found.

Common Gateway Interface (CGI)An Internet standard for defining scripts that pass information from a web server to an application program, through an HTTP request, and vice versa.

Common INET (CINET)A physical file system layer for the address families AF_INET and AF_INET6 that multiplexes sockets across several other physical file systems or transports.

common interchange unit (CIU)The independent unit of transfer for a common interchange file (CIF). It is the part of the CIF that identifies the relationship to the receiving database. A CIF can contain multiple CIUs.

Common Internet File System (CIFS)

A protocol that manages shared, remote file access for applications to files, printers, serial ports, and so on over a TCP/IP network.

A protocol that enables collaboration on the Internet by defining a remote file-access protocol that is compatible with the way applications already share data on local disks and network file servers. See also Server Message Block 2.0, Server Message Block.

common keyIn COBOL, the key fields that are common to all record formats in the file starting with the first key field (the most significant) and ending with the last key field (the least significant).

Common Language for Expression Manipulation (CLEM)A powerful language for analyzing and manipulating the data that flows along SPSS Modeler streams. A subset of the CLEM language can be used when scripting in the user interface, allowing many of the same data manipulations to be automated.

common language runtime (CLR)The runtime interpreter for all .NET Framework applications. See also .NET Framework.

Common Link Access to Workstation (CLAW)

A continuously executing program designed to minimize host interrupts while maximizing channel utilization.

The architecture that defines the channel commands used between the host and the channel attachment adapter.

Common Locale Data Repository (CLDR)A standard repository of locale data. This data is used for such tasks as formatting dates, times, time zones, numbers, and currency values and sorting text.

Common Manageability Programming Interface (CMPI)A common C-based interface that is between the CIM server and provider. The provider that is implemented with CMPI can run with the CIM server.

Common Management Information Protocol over TCP/IP (CMOT)An Internet Engineering Task Force (IETF) specification for the use of CMIP over a TCP/IP protocol stack.

common management information service (CMIS)In OSI, the set of services defined by ISO 9595. The common management information service is used by agent processes and managing processes to communicate.

common management model (CMM)A model that describes how to represent IT entities as managed resources and services. See also Common Information Model.

common message logA log that contains messages from several Infoprint Server components, including Print Interface, NetSpool, and IP PrintWay extended mode. Infoprint Central and the aoplogu command can display messages in the common message log.

common MPTN manager (CMM)The component of the MPTN architecture that provides services independent of any transport protocol. Examples include registering transport users with the MPTN address-mapper component, selecting a transport provider, and establishing MPTN connections.

common neighborAn entity that is directly connected to at least two other entities. For example, if C is connected to A and B, then C is a common neighbor of A and B. See also binding strength, connection.

Common Object Request Broker Architecture (CORBA)An architecture and a specification for distributed object-oriented computing that separates client and server programs with a formal interface definition. See also Internet Inter-ORB Protocol.

common operations services (COS)The portion of SNA management services that pertains to the major vectors for limited remote operations control.

Common Platform Storage SubsystemsA strategy and family of storage products based on common hardware parts.

common programIn COBOL, a program that, despite being directly contained within another program, can be called from any program directly or indirectly contained in that other program.

Common Programming Interface (CPI)In Systems Application Architecture (SAA), a set of software interfaces, conventions, languages, and protocols that provide a framework for writing applications with cross-system consistency.

Common Programming Interface for Communications (CPI-C)A call-level interface that provides a consistent application programming interface (API) for applications that use program-to-program communications. CPI-C uses LU 6.2 architecture to create a set of interprogram services that can establish and end a conversation, send and receive data, exchange control information, and notify a partner program of errors.

Common Queue Server (CQS)The address space that manages the shared queues for its clients (IMS).

Common Secure Interoperability Version 2An authentication protocol developed by the Object Management Group (OMG) that supports interoperability, authentication delegation and privileges.

common serviceA function available to applications on a variety of operating system platforms, accessible through any supported programming language. A common service can include support for character classification, collation, case conversion, data formatting, and so on.

common service area (CSA)In a z/OS operating system, a part of the common area that contains data areas that can be addressed by all address spaces but is protected during its use by the key of the requester.

Common Service Layer (CSL)A collection of IMS manager address spaces that provide the infrastructure that is needed for systems management tasks. The CSL address spaces include Open Database Manager (ODBM), Operations Manager (OM), Resource Manager (RM), and Structured Call Interface (SCI). The CSL is built on the Base Primitive Environment (BPE) layer.

Common Service Layer client (CSL client)A z/OS address space that uses the services that are provided by the Common Service Layer (CSL). The IMS control region is an example of a CSL client.

Common System AdministrationA core capability of the IBM Autonomic Computing Initiative that addresses the need to reduce the complexity of computer operations.

common system area

In MVS, an area that contains system control programs and control blocks.

A major CICS storage control block that contains areas and data required for the operation of CICS.

common table expressionAn expression that defines a result table with a name (a qualified SQL identifier). The expression can be specified as a table name in any FROM clause in the fullselect that follows the WITH clause.

common user identification (common user ID)In System i Access, the user identification of a System i Access user that is used by the router when establishing a communications connection with a host system if a user ID is not specified in either the CONFIG.PCS file or in an alternative configuration file. The router uses this common user ID when connecting the personal computer to each additional host system. See also user identification.

common-use sizesA set of paper sizes most commonly used throughout the world. Common-use sizes are used on AFP printers.

common VTOC access facility (CVAF)A set of macros that enables programs to access data in the volume table of contents (VTOC) and the VTOC index.

Common Vulnerability Scoring System (CVSS)A scoring system by which the severity of a vulnerability is measured.

common warehouse metamodel (CWM)A metamodel written to be a common standard by the Object Management Group (OMG).

common widgetA widget provided by IBM that is not associated with a particular product. See also widget.

common work area (CWA)

A work area that can be accessed by any transaction in the CICS system.

An area within the CSA that can be used by application programs for user data that needs to be accessed by any task in the system. See also transaction work area.

communicationThe process of sending or receiving data between two points of a network.

communication adapter

An optional hardware feature, available on certain processors, that permits communications facilities to be attached to the processors.

A device that allows network communication.

communication area (COMMAREA)A CICS area that is used to pass data between tasks that communicate with a given terminal. The area can also be used to pass data between programs within a task.

communication attachedIn PSF, pertaining to a device that is SNA-attached and that uses a communication controller. See also attached processor, local attached.

communication buffer exit libraryA dynamically loaded, shared library that interacts with the DB2 communication layer and has access to the contents of the unencrypted communication buffers that are received at the server from clients and sent from the server to clients.

communication callA conversation statement that transaction programs can issue to communicate through the LU 6.2 protocol boundary. The specific calls that a transaction program can issue are determined by the program's current conversation state.

communication cardIn a personal computer, an expansion board that contains a modem or that allows use of network services.

A controller that regulates the exchange of data between Gentran Server for Windows and its organizations (value-added networks (VANs) or trading partners). Through the Gentran Server for Windows file interface, the communication controller can support leased or dialed connections, as well as interaction with third-party communications packages. To be a communications controller, a machine must be capable of sending and receiving files via a modem or other communications device. In a single workstation system, all three controllers (communications controller, process controller, and the Gentran Server for Windows Primary System Controller) all reside on the same machine.

A device that directs the transmission of data over the data links of a network; its operation may be controlled by a program executed in a processor to which the controller is connected or it may be controlled by a program executed within the device. (T)

A type of communication control unit whose operations are controlled by one or more programs stored and executed in the unit. It manages the details of line control and the routing of data through a network. See also transmission control unit.

Communication Controller for Linux on System zThe replacement for the 3745/6 Communication Controller. Using the Communication Controller for Linux on System z enables the Network Control Program (NCP) software to continue to provide the following functions: SNI, XRF, BNN, INN, and SSCP takeover.

communication control unitA communication device that controls transmission of data over lines in a network.

communication endpointIn X.25, the local communication channel between a Data Link Service (DLS) user and a DLS provider.

communication line block (CLB)An IMS control block that represents a VTAM node or a BTAM line. Each VTAM node or BTAM line has a single CLB.

communication line processor (CLP)In a communication controller, the processor that manages telecommunication lines.

communication management configuration (CMC)In VTAM, a technique for configuring a network that allows for the consolidation of many network management functions for the entire network in a single host processor.

communication management configuration host nodeThe type 5 host processor in a communication management configuration that does all network-control functions in the network except for controlling devices that are channel-attached to data hosts. See also data host node.

communication name table (CNT)An IMS control block that represents a logical terminal.

communication network management (CNM)The process of designing, installing, operating, and managing the distribution of information and control among users of communication systems.

communication network management application programA VTAM application program that issues and receives formatted management service request units for physical units. The NetView program is an example of a CNM application program.

communication network management interface (CNMI)An interface that the access method provides to an application program for handling data and commands that are associated with communication systems management. CNM data and commands are handled across this interface.

communication network management processorA program that manages one of the functions of a communications system. A CNM processor is executed under control of the NetView program.

communication pathAn IP label or address or a fully qualified domain name that corresponds to the host name of the cluster node. The communication path is used for communication with remote nodes during the cluster configuration process.

communication port

On a personal computer, a serial port to which a stand-alone modem can be attached.

An access point for data entry or exit to or from a communication device such as a workstation.

communication protocolA set of defined interfaces that permit computers to communicate with each other.

communication resource managerA resource manager that coordinates a two-phase commit across multiple nodes in a distributed transaction. These nodes may be on the same system or multiple systems.

communications adapterAn adapter that performs activities that control the transmission of business process data between Sterling B2B Integrator and external applications.

communications areaIn query management, a control block used to communicate between the system code supporting the Common Programming Interface (CPI) and the application program using the CPI.

communication scanner processor (CSP)A processor in the 3725 Communication Controller that contains a microprocessor with a control code. The code controls transmission of data over links attached to the CSP.

communications channelAn electrical path that facilitates transmission of information from one location to another.

communications configurationThe physical placement of communications controllers, the attachment of communications lines, and so forth; and the configuration descriptions that describe the physical configuration to the system and describe how the configuration will be used by the system.

communications database (CDB)A set of tables in the DB2 for z/OS catalog that is used to establish conversations with remote database management systems.

communications data formatIn RJE, the output data received from the host system is left the same as it was received (either compressed, or data cut off at the end, or both).

communications data set (COMMDS)The primary means of communication among systems governed by a single storage management subsystem (SMS) configuration. The COMMDS is a linear data set (LDS) that contains the name of the active control data set (ACDS) and current usage statistics for each system-managed volume, which helps balance space among systems running SMS. See also active control data set, control data set, source control data set.

communication sectionPart of the task control area (TCA) that is used by CICS and by user-written application programs for communication between the application program and CICS management and service programs.

communications enabled applicationA software application that uses an IP network and communications technology to accomplish business objectives. Enterprise applications can be communications enabled with web telephony components and collaborative web services that allow users to dynamically interact through shared browser sessions over a secure network.

communication sessionThe connection between two stations that lets them transmit data.

communications gatewaySoftware or a computer running software that enables two different computers to communicate.

communications infrastructureIn the AIX operating system, a framework of communication that consists of a postmaster, an object registration service, a startup file, communication protocols, and application programming interfaces.

communications jobA batch job that is started by a program start request from a remote system.

communications line

The physical link (such as a wire or a telephone circuit) that connects one or more work stations to a communications controller, or connects one controller to another. See also data link protocol.

The line over which data communications take place; for example, a telephone line.

communications managerA function that manages the use of the system's communication facilities.

communications protocolIn networking, a set of standards defining how computers are to exchange information.

communications securityA system option that requires the identity of a remote location to be verified before that location can run programs on a system.

Communications ServerIBM SecureWay Software that supports (a) the development and use of application programs across two or more connected systems or workstations, (b) multiple concurrent connections that use a wide range of protocols, and (c) several application programming interfaces (APIs) that may be called concurrently and that are designed for client/server and distributed application programs.

communications sessionEverything sent and received to/from one telephone number in one continuous period of connection. This could include sending two or three interchange envelopes to a network, each for a different trading partner.

communications side informationIn CPI Communications, an object that contains initialization parameters, such as the name of the partner program with which a program can establish a conversation and the name of the logical unit (LU) at the partner program's node, which CPI Communications requires to establish a conversation. The system-recognized identifier for the object type is *CSI.

communications softwareSoftware that enables a computer to connect with another computer and to exchange information. Communications software can maintain settings for the connection, coordinate transmission of data and messages, as well as other tasks relating to the connection between the computer systems.

communications storage manager (CSM)In VTAM, a buffer management technology that reduces performance overhead resulting from the movement of large amounts of data. CSM enables authorized host application programs to put data in buffers that can be addressed and accessed by other authorized host application programs without any need to copy the data.

communications typeA method for application programs to communicate on a local system, or between a local system and a remote system using the intersystem communications function (ICF). Examples of these communications methods include (a) asynchronous communications, (b) binary synchronous communications (BSC), (c) intrasystem communications, or (d) Systems Network Architecture (SNA), such as advanced program-to-program communications (APPC) and SNA upline facility (SNUF).

Communications UtilitiesThe IBM licensed program that contains the VM/MVS bridge and the remote job entry function. Communications Utilities provides a method of exchanging mail or files and submitting or receiving jobs between connected systems.

communication timeoutThe intentional ending of an incomplete task after waiting a specified amount of time.

communicatorA Message Passing Interface (MPI) object that describes the communication context and an associated group of processes.

community

A collection or grouping of trading partners for the purpose of achieving a common goal.

An online resource where groups of people with a common interest can interact with each other.

A collection of consumer organizations. It is used as a grouping construct when publishing APIs. Communities are used to restrict the visibility and accessibility of APIs.

In SNMP, the relationship between an agent and one or more managers. The community describes which SNMP manager requests the SNMP agent should honor.

A group of users whose accounts are stored in the same user registry.

A repository area where an assigned group of users can work together.

An online resource where groups of people with a common interest can interact with each other.

A web trading group that enables buyers and sellers to conduct business. Partners receive invitations from the sponsor to join their community. See also partner.

community administratorA person who manages users in and across communities.

community invitationAn email invitation to join a community.

community libraryA library created directly in a community using the Library widget that provides community members with content management capabilities such as check-in/check-out, version control, and enhanced social features such as tagging and liking. See also linked library.

community nameThe part of an SNMP message that represents a password-like name and that is used to authenticate the SNMP message.

community of interestA group of people with a common interest or a common goal.

commutativeCombining mathematical elements or having elements that combine in a way that the result is independent of the order in which they are processed. For example, such that a + b = b + a and a x b = b x a.

commutator functionA Boolean function whose arguments are the reverse of, and evaluates to the same result as another Boolean function. Commutator functions might execute quicker depending on the nature of the query.

compact

To compress a database, in order to reclaim space freed by the deletion of documents and attachments.

To replace repetitive bits in a file or folder with control bits so that the file or folder takes up less space when saved.

compact disc (CD)An optical disc that stores digital data.

compact-disc read-only memory (CD-ROM)High-capacity read-only memory in the form of an optically read compact disc.

compact disc recordable (CD-R)A device that can write data to compact disc recordable (CD-R) discs. A CD-R then can be read like CD-ROM media.

compact drawingA drawing that is stored as one file so that its information can be merged with the information of other drawings.

compact peacock layoutA layout in which complex groups of linked entities are arranged to highlight the structure of associations. It is most suitable for charts with many linked entities. See also layout.

compact tree displayA display type in which data is presented in a compressed radiating tree.

companyThe data model and content for a particular business unit or enterprise that can be used to manage, link, and synchronize product information both internally and externally. See also data model.

company administratorA person with the Administrator account role who has access to administer the cloud service for a company.

company applicationAn application that is designed for internal use inside a company.

Company HubAn application that can distribute other specified applications to be installed on a mobile device. For example, Application Center is a Company Hub. See also Application Center.

comparison operator

A built-in function that is used to compare two values and is based on the selected term data type.

In SQL, a symbol used in comparison expressions to specify a relationship between two values. Comparison operators are = (equal to), <> (not equal to), < (less than), > (greater than), <= (less than or equal to), and >= (greater than or equal to).

A built-in function that is used to compare two values. The comparison operators are ==, !=, <, >, <= and >=. See also operator.

In REXX, an operator that compares two terms and returns the value 1 if the result of the comparison is true, or 0 if it is not true.

compatibilityThe ability of a device or system to work with another device or system without modification.

compatibility fontAn AFP font designed to emulate the uniformly spaced and fixed-pitch fonts used with line printers.

compatibility mode

A mode of operation in which a device can simulate the function of another device or model. The device will function like a different device of the same type, ignoring some or all of the additional features that the device might possess. Compatibility mode permits a migration between devices with minimal impact on programs that have device dependencies. See also 32-name mode, page mode.

A mode of processing in which the IEAIPSxx and IEAICSxx parmlib members determine system resource management.

compatibility TRCTable reference characters acceptable for print jobs printed on the IBM 3800 Printing Subsystem Model 1 that can be used when printing on a page printer with little or no change to the application or to the job control statements.

compatiblePertaining to the ability of a device or program to work with another device or program.

compatible data typesTwo different data types that can be cast to one another in the database. See also implicit cast.

compatible disk layoutA disk structure for Linux on System z that permits access from other System z operating systems. See also Linux disk layout.

compatible offeringsOfferings that have identical sets of base offering components such as resource type and measurement source. The corresponding offering components in each compatible offering can have different sets of metrics.

compatible query mode (CQM)The query processing mode that is consistent with version 8.4.1 of Cognos Business Intelligence, and that is maintained for upgrade success. See also dynamic query mode.

compatible scheduleA schedule that has the states needed by the breach values in the offering components for an offering.

compatible serverIn the Distributed Computing Environment (DCE), a server that offers the requested Remote Procedure Call (RPC) interface and RPC object and that is accessible over a valid combination of network and transport protocols.

compatible unit (CU)A construction template that defines labor, materials, services, and tools resources that are required to perform construction work, such as installing a utility pole. Compatible units are used as the basis for estimating the costs and resource requirements that are associated with construction work orders.

compensation

On a federated system, the ability to process a portion of an SQL statement that is not supported by a data source. See also pushdown, query optimizer.

The means by which operations in a process that have successfully completed can be undone if an error occurs, to return the system to a consistent state.

In MPTN architecture, the action of making up for differences in functions that are requested by the transport user and those provided by the transport provider.

compensation flowFlow that defines the set of activities that are performed while the transaction is being rolled back to compensate for activities that were performed during the normal flow of the process. A compensation flow can also be called from a compensate end or intermediate event.

compensation serviceThe operation that is performed to compensate for a successful operation when a process generates a fault (which is not handled within the process).

competencyA work-related role or field that is used to identify resources, for example, Manager, Programmer, Network Technician.

competitive advantageThe distinct way in which a business entity is positioned in the market to obtain leadership over competitors, providing the ability to maintain sustained levels of profitability above the industry average.

competitive associationAn association between similar items from different manufacturers. For example, if a store sells a basketball shoe made by Company X, the store might also offer buyers a similar basketball shoe made by Company Y.

competitorA retailer who is identified when price matching an item, and who may be offering the item at a lower price than that offered by the corresponding enterprise.

compilation

In Ada language, the translation of an Ada source program into an executable object module.

Translation of a source program (such as RPG or COBOL specifications) into a program in machine language. In Integrated Language Environment (ILE) languages, compilation translates source statements into modules, which then can be bound into programs or service programs.

compiled programIn the original program model (OPM), the set of machine-language instructions that is the output from the compilation of a source program. The actual processing of data is done by the machine-language program. The system-recognized identifier for the object type is *PGM.

compiled SQL PLSQL procedure language statements that are compiled into sections within a package. See also inline SQL PL.

compilerA program that translates a source program into an executable program (an object program).

compiler-directing statement

In RPG, an instruction that controls a compilation listing or causes records to be inserted. The four compiler directives are /TITLE, /EJECT, /SPACE, and /COPY.

In COBOL, a statement, beginning with a compiler-directing verb, that causes the compiler to take a specific action during compilation. The compiler-directing statements are the COPY, ENTER, REPLACE, and USE statements.

A statement that controls what the compiler does rather than what the compiled program does.

compiler directiveA statement that controls what the compiler does rather than what the user program does.

compiler listingA printout that is produced by compiling a program or creating a file and that optionally includes, for example, a line-by-line list of the high-level language source, a cross-reference list, diagnostic information; and for programs, the description of the externally described files.

compiler optimizationA change that the compiler makes to code at compile time to make it more efficient.

compiler optionA keyword that can be specified to control certain aspects of compilation. Compiler options can control the nature of the load module generated by the compiler, the types of printed output to be produced, the efficient use of the compiler, and the destination of error messages.

compile timeThe time period during which a computer program is being compiled into an executable program.

compile-time arrayIn RPG, an array that is compiled with the source program and becomes a permanent part of the program. See also preruntime array, runtime array.

compile-time optionA keyword that can be specified to control certain aspects of compilation. Compiler options can control the nature of the load module generated by the compiler, the types of printed output to be produced, the efficient use of the compiler, the destination of error messages, and other things.

compile-time tableIn RPG, a table that is built into the source program and that becomes a permanent part of the compiled program. See also runtime table.

complement

The value that can be added to the number to equal a given value.

In Cryptographic Support, a binary value that, in an exclusive-OR operation with a given binary value of the same length, produces a binary value of all ones.

complementary itemAn item that a customer might want to buy with another item.

A table attribute that indicates that the table contains a row for every primary key value of interest. As a result, a complete source table can be used to perform a refresh of a target table.

A property of a search algorithm such that, when it returns failure in a search, it has proved that no solution exists satisfying the constraints that governed the search, and when it returns success, it is capable of finding all the possible solutions satisfying the constraints of the problem.

complete CCD tableIn data replication, a CCD table that initially contains all of the rows from the replication source table or view and any predicates from the source table or view. See also noncomplete CCD table.

complete class nameThe complete qualification of a nested C++ class name including all enclosing class names and namespaces.

completed change setA change set that can no longer be changed. Change sets can be shared with others only after they are marked as a completed change set.

completed sessionAny session in which the visitor is no longer actively exploring the web application or has been timed out by the web application.

complete lifecycle serverA server that the user can create and manage within the administrative console.

complete overwrite installationAn installation method that completely overwrites an existing version of BOS that is installed on a system.

complete packet sequenceEither an individual X.25 data packet or a sequence of packets with the more-data bit (M-bit) set to 1 and the delivery-confirmation bit (D-bit) set to 0, followed by a further data packet with the M-bit set to 0 and the D-bit set as required.

complete type nameThe name of a type that represents its hierarchical structure within a type tree, which includes the names of all the types in the path from the root type down.

Complete Zip Auditing and Rating (CZAR)A rating used as a basis for pricing the shipping of products by carriers.

completion code

An indicator that reflects the status of a task set at the time of its completion.

A return code indicating how a message queue interface (MQI) call has ended.

In Tivoli Workload Scheduler for z/OS, a system code that indicates how the processing of an operation ended at a workstation. See also error code.

A message the storage system sends as a result of running a command-line interface (CLI) command.

completion messageA message that tells the operator when work is successfully ended.

complex

The maximum set of hardware and software resources that support one or more images of a single operating system.

In data processing or software engineering, pertaining to an application that may have many components, such as a graphic user interface, a client-server architecture, an engine, a database connection, an output device, input facilities, and so forth.

complex activityA step in a business process that provides direction for how the next step should be executed. There are three kinds of complex activities: sequence (serial), choice (conditional), and all (parallel).

complex changeA single operation that impacts one or more ontologies and spans multiple repository versions. Examples of a complex change are ontology content pack (OCP) imports and ontology deletions.

complex conditionIn COBOL, a condition in which one or more logical operators (AND, OR or NOT) act on one or more conditions. Complex conditions include negated simple conditions, combined conditions, and negated combined conditions. See also simple condition.

complex constantIn FORTRAN, an ordered pair of real or integer constants separated by a comma and enclosed in parentheses. The first constant of the ordered pair represents the real part of a complex number; the second represents the imaginary part.

complex data typeA data type that is built from a combination of other data types by using an SQL type constructor and whose components can be accessed through SQL statements. See also collection data type, data type, row data type.

complex elementA named structure that contains simple elements within the message. Complex elements can contain other complex elements, and can also contain groups. The content of a complex element is defined by a complex type. See also element.

complex event processing (CEP)

The processing of events that have rules that rely on the data and timing of more than one event.

A set of tools that processes event transactions and generates event alerts based on configured business rules.

complex imageAn image divided into regions called image cells. See also simple image.

complex instruction set computer (CISC)A computer that uses the traditional processor architecture to process instructions. See also reduced instruction set computer.

complexityA measurement of how many more computing resources the solution of a problem requires as the problem grows in number of variables. Complexity is expressed in notation known informally as Big O notation or more formally as Omega notation.

complexity attributeAn attribute that enables the selection of another attribute by which work items are sized. This attribute is used in release plans to compute the progress of each plan.

complex numberA number consisting of an ordered pair of real numbers, expressible in the form a+bi, where a and b are real numbers and i squared equals minus one.

complex qualificationA WHERE clause in a query that uses two or more logical operators on the same column as where the R-tree index is defined.

complex scorecardA collection of multiple scorecards within one rule flow. The rule flow is used to identify the dependency, the flow and the order in which the score from each of the scorecards will be included in the overall score.

complex text language (CTL)A language that has the properties of a simple text language but also additional characteristics of bidirectionality, automatic character shaping, or combining sequences. They use typically small character sets. Combining sequences include characters combined to form new characters, and characters combined with tone marks. In languages that are written in a bidirectional manner, the native words are written from right to left (as in Hebrew and Arabic), while numbers and borrowed words are written from left to right. Arabic and similar scripts use cursive writing and require automatic shaping of characters for rendering. See also ideographic language, simple text language.

complex type

In Enterprise Service Tools, a structure within a message. A complex type contains elements, attributes, and groups organized into a hierarchy.

A type that contains elements and can include attributes. See also simple type.

In Fortran, a data type that represents values of complex numbers. A value is expressed as an ordered pair of real data items separated by a comma and enclosed in parentheses. The first item represents the real part of the complex number, and the second item represents the imaginary part.

A type definition for an XML element that contains nested structures.

complex wordA word formed by combining a root word with affixes, for example: the prefix 'un-' and the suffix '-ful' attach to the root word 'faith', which creates the complex word 'unfaithful'.

complex word processingIn lexical analysis, the process in which algorithmic processing is used to determine the boundaries of words. In the case of Indo-European languages, the LanguageWare algorithm uses constraints in order to determine optimal boundaries. For Chinese, LanguageWare uses statistical processing - word frequencies and collocation frequencies. For Japanese LanguageWare uses a combination of statistical and grammatical processing.

compliance

The state of being in accordance with regulated standards

The state of an implementation that fully meets each and every requirement of the standards specification. Specifically, each transaction, action, or data element produced by the implementation must be valid as defined by the standard.

A state of being in accordance with established software and security specifications on target computers, or the process of becoming so.

compliance checkA group of settings used to determine whether a computer or group of computers is compliant or not. There are two types of compliance checks: software and security.

compliance reportA report that shows the number of available systems that specified installation activities can be performed on, and the percentages of the states of the installation activities.

compliance ruleA rule that is set and enforced by a buyer for a supplier to follow.

compliance serviceA service that allows the buyer to customize products for their customers. For example, a compliance service might be configured for an item so that the item is shipped to the buyer with the buyer’s brand label.

compliance typeIn i5/OS licensed management, the value that determines the action the product must take when the authorized usage limit is reached or exceeded. The warning compliance type indicates users are never denied access to a product. The operation action compliance type means that new users are denied access to the product once the usage limit is reached, but users that are currently using the product still have access.

compliant stateThe state of conforming to the defined rules of compliance.

component

An element of the system under test. A component can include service providers and infrastructure elements.

In Eclipse, one or more plug-ins that work together to deliver a discrete set of functions.

A grouping of related artifacts in a stream or repository workspace. A component can contain any number of folders and files.

A reusable object or program that performs a specific function and works with other components and applications.

A ClearCase object that is used to group a set of related directory and file elements within a Unified Change Management (UCM) project. Typically, the elements that make up a component are developed, integrated, and released together. A project must contain at least one component, and it can contain multiple components. Projects can share components.

A part of a structured type or value, such as an array element or a record field.

A software item that is part of a software product, and might be separately identified, but is not individually licensed.

A representation of deployable items and the user-defined processes that operate on them, usually by deploying them.

A visual element of a host screen, such as a command line, function key, or selection list. HATS applications transform host components into widgets.

The main building block that is used to define trigger events in a trigger system.

A hardware or software entity forming part of a system, or a piece of logic that controls the operation of a device, modifies, or stops a control function.

A unit of organization consisting of a reusable set of engineering artifacts. See also artifact, stream.

A container that is used to organize a model. When creating a new model, components should be created first, in order to give the model a framework and ensure that it is easy to navigate. Once components have been created, model elements, such as tables, calculations, and plans can be built. See also baseline, stream.

A named, cataloged collection of stored records, such as the data component or index component of a key-sequenced file or alternate index. A component contains no named subsets.

In VisualAge RPG, a functional grouping of classes and related files within a product.

A part of a specified source that generates an audit message (such as the Gentran Server for Windows Unattended program).

An entity about which measurements are collected for reporting purposes. Sample components include a specific network storage device; the web address http://www.ibm.com; and a person with whom one has a customer relationship. Each component type in the data model has a set of metrics and attributes that apply to all components of that type.

A set of modules that performs a major function within a system.

component associationIn the IBM Director Rack Manager task, a function that can make a managed system or device rack-mountable when the inventory collection feature of IBM Director does not recognize the managed system or device. The function associates the system or device with a predefined component.

component-based development (CBD)The creation and deployment of software-intensive systems assembled from components as well as the development and harvesting of such components.

component data elementA simple data element that belongs to a composite data element. Component data elements are also called subelements.

component modelA software development model that provides for consistent packaging of software components; the ability to upgrade part of a system as it is executing; the ability to control, monitor, and deploy software across global networks; and the ability to locate and implement services on a global scale. When developed according to the component model, components have interfaces that are rigorously implemented, are packaged into JAR files, and have dynamic execution environments.

component productA product (child) that is part of a bundle (parent) that can consist of many components.

component projectOne of the individual projects in a program; may consist of multiple projects within the same organization.

component queueA queue holding work items that can be completed by an external entity that interacts with the workflow. See also queue.

component ruleAn expression about one or more components, which is defined in the Type Designer. A component rule is used for validating data and specifies what must be true for the data that is defined by that component to be valid.

component setIn NetDA/2, a set of nodes, transmission groups (TGs), or both.

component set expressionIn NetDA/2, a user specification that defines a set of components (nodes and transmission groups).

component store archiveA starter store archive for a component of a composite store archive. Component store archives are available for each business model. See also composite store archive.

component testAn automated test of one or more components of an enterprise application, which may include Java classes, EJB beans, or web services. See also abstract test, test pattern.

component trace (CTRACE)A service that provides a way for z/OS components to collect problem data about events.

composed-text print jobIn VSE, a print job that has been composed into pages. The composed-text print job is usually the output of a text formatting program such as DCF and is composed entirely of AFP structured fields.

composerIn Java, a class used to map a single complex bean field to multiple database columns. Composition is needed for complex fields that are themselves objects with fields and behavior.

composite

A group of related data elements used in EDI transactions.

In multimedia applications, the combination of two or more film, video, or electronic images into a single frame or display.

A Service Component Architecture (SCA) element that contains components, services, references, and wires that connect them.

A class that is related to one or more classes by a composition relationship.

composite applicationAn application representing an open architecture in which components of the applications can be developed by IBM or by independent software vendors.

composite bar chartIn the GDDM function, a bar chart in which multiple vertical axis values for the same horizontal axis value are stacked one on top of another. See also floating bar chart, multiple bar chart.

composite bar graphIn Performance Tools, a bar graph in which multiple vertical axis values for the same horizontal axis value are stacked one on top of another. See also floating bar graph.

composite block indexAn index that contains only dimension key columns and is used to maintain the clustering of data during insert and update activity in a multidimensional clustering (MDC) or insert time clustering (ITC) table. See also dimension block index.

composite business policyA runtime aggregation of business policies based on context, content and contract of a service request.

composite business service (CBS)A collection of business services that work together, along with the existing applications of a client, to provide a specific business solution.

composite catalog entryA collection of catalog entries that breaks down to its separate components when ordered. See also dynamic kit.

composite columnA column that contains data that corresponds to similar data stored in two or more columns in another table.

composite data elementA data element that contains two or more component data elements or subelements. Composites are defined by the EDI standards that use them (EDIFACT, TRADACOMS, and certain ANSI X12 standards).

composite eventA "high-level" event, typically formed from the combination of two or more atomic events. However, composite events can be "empty" - that is, they may contain no sub-events. See also atomic event, user-defined event.

composite expressionIn Q Language, a large expression that has been created from a series of smaller expressions. See also arithmetic operator.

composite indexAn index constructed on two or more columns of a table. The order imposed by the composite index varies least frequently on the first-named column and most frequently on the last-named column.

composite key

An ordered set of key columns of the same table.

An ordered set of key columns or expressions where the referenced column names are from the same table. See also key.

A key for a file or record format that is composed of more than one key field.

composite LEN nodeA type 5 node and its subordinate type 4 nodes that support LEN protocols and appear to an attached APPN or LEN node as a single LEN node.

composite libraryThe host's virtual view of the Peer-to-Peer Virtual Tape Server (PtP VTS) subsystem. In general, host communication with a library will occur at the composite level with the virtual volumes and drives being defined to the composite library.

composite networkIn MPTN architecture, a single-protocol transport network made up of multiple individual networks running the same transport protocol, each with its own unique net ID.

composite network node (CNN)A type 5 node and its subordinate type 4 nodes that support APPN network node protocols and appear to an attached APPN or LEN node as a single network node.

composite objectAn object that contains other objects. For example a document object that contains not only text, but also graphics, audio, image, and video objects, each of which can be manipulated separately as an individual object.

composite partIn VisualAge RPG, a collection of controls selected by the user on the GUI designer tool suite and then placed in the parts palette.

composite projectA container holding projects or composite projects, or both. Composite projects are used to organize the projects associated with the software application.

composite rotationThe total amount of rotation done by the printer to place text in the correct orientation on the page.

composite serviceIn service-oriented architecture, a unit of work accomplished by an interaction between computing devices.

composite stateIn a business state machine, an aggregate of one or more states that is used to decompose a complex state machine diagram into a simple hierarchy of state machines.

composite store archiveA compressed file that contains the organization structure, predefined user roles, and necessary access control policies to create the appropriate store environment, plus a working starter store or site. Each of the parts that make up the composite store archive are also available as separate store archives. See also component store archive, store archive.

compositional hierarchyA hierarchy in which the composition of the data is reflected in the structure of the group type in the group window. See also classification hierarchy.

Composition ServicesThe component of the WebSphere Commerce messaging system that provides a formatted output for messages using JSP templates.

composition unitA unit that represents a configured asset and enables the asset contents to interact with other assets in the application.

compositorA person or program that composes text.

compoundA number of related questions, grouped for presentation purposes, that share a category list.

compound activityAn activity that has detail that is defined as a flow of other activities. A compound activity is a branch (or trunk) in the tree-structure hierarchy of process activities. Graphically, a compound activity is a process or subprocess.

compound command processorA series of commands that appear to run as a single command. The commands can have interactions with tasks in the same domain or in other domains.

compound conditionIn COBOL, a statement that tests two or more relational expressions. The result can be true or false.

compound documentA collection of files that are used together to create a group of linked documents.

compound keyIn a relational database, a key that consists of two or more attributes in a relation.

compound licenseIn License Use Management, a type of license that allows a system administrator to generate license passwords for a given number of licenses. Such a license is valuable when an administrator needs a certain number of licenses, but does not yet know what machines or who will use them.

compound LookA compound that describes how questions, that are to be presented as a compound question, are to appear.

compound passwordA password from which it is possible to extract multiple simple passwords, each representing one or more licenses. See also password, simple password.

compound SQL statementA block of SQL statements that is executed in a single call to the application server.

compound stringA type of string designed to simplify foreign language support by allowing text to be displayed without hard-coding the language-dependent attributes (character set, text, and direction).

compound symbolIn REXX, a symbol that permits the substitution of variables within its name, when referred to. A compound symbol contains at least one period and at least two other characters. It cannot start with a digit or a period, and if there is only one period in the compound symbol, it cannot be the last character. The compound symbol begins with a stem (that part of the symbol up to and including the first period). The stem is followed by the tail (the parts of the name, delimited by periods, that are constant symbols, simple symbols, or null). Compound symbols allow the construction of arrays, associative tables, lists, and so on.

compound testA test asset type that is used to group tests into larger test flows. The tests in a compound test can all be of the same test type or of a different type.

compound variableIn REXX, a symbol that contains at least one period, one character before the period, and one character after the period. A compound variable cannot start with a digit or period.

compound wordA morphologically complex word constructed out of two or more word formation elements, such as 'snowboard' and 'post office'. See also multiword expression, solid compound.

comprehensive command authorityIn DFSMShsm, the level of permission that lets a user issue the ABACKUP command for all aggregate groups.

compress

To reduce the size of a set of data, such as a file, to save space or transmission time. See also compressed format.

To hide objects within a data hierarchy. A plus sign is used in a compressed section to indicate that objects are hidden.

compressed audioA method of digitally encoding and decoding several seconds of voice quality audio per single videodisc frame. This increases the storage capability to several hours of audio per videodisc. Sometimes referred to as still frame audio or sound over still.

compressed bitmapAn indexing method that identifies records through a fragment identifier and a record identifier.

compressed formatA type of extended-format data set. In the Virtual Storage Access Method (VSAM), individual records are put in a compressed-format data set; in the sequential access method (SAM), individual records or blocks are put in a compressed-format data set. See also compress, extended format.

compressed-format data setA type of extended-format data set created in a data format that supports record-level or block-level compression.

compressed listingIn CoOperative Development Environment/400, a graphical representation of the listing of the program currently being debugged. See also compressed source.

compressed sourceIn CoOperative Development Environment/400, a graphical representation of the source of the program currently being debugged. See also compressed listing.

compressed videoVideo resulting from the process of digitally encoding and decoding a video image or segment using a variety of computer techniques to reduce the amount of data required to represent the content accurately.

compression

In SNA, the replacement of a string of up to 64 characters by an encoded control byte to reduce the length of the data stream sent to the LU-LU session partner.

The act of hiding child items of a selected object when the outline view is selected.

A function that removes repetitive characters, spaces, strings of characters, or binary data from the data being processed and replaces characters with control characters. Compression reduces the amount of storage space that is required for data.

compression acceleratorHardware onto which the work of compression is off-loaded from the microprocessor.

compression algorithmAn algorithm used to compress image data. Compression of image data can decrease the volume of data required to represent an image.

compression dictionaryThe dictionary that is referred to during the process of compression and decompression. In DB2 for z/OS, this dictionary is created from the data in a table space or table space partition. In DB2 for Linux, UNIX, and Windows, this dictionary is created from data in each table partition, data in each table in a database partition, or XML data stored in the XML storage object of a table. A compression dictionary is specific to the table space, table space partition, table, or XML storage object from which it was created. See also automatic dictionary creation.

computational memoryThe set of all virtual-memory pages in real memory that are part of working-storage or program-text segments.

compute-boundThe property of a transaction whereby the elapsed time for its execution is governed by its computational content rather than by its need to do input/output.

computed attributeAn attribute type that is specific to the pricing administration.

computed constructorA constructor that creates element, attribute, document, text, processing-instruction, or comment nodes in which the content of the node is based on enclosed expressions. See also constructor, direct constructor.

computed fieldOn a form, a field whose value is determined by a formula that the application designer writes.

computed timeIn the Distributed Computing Environment (DCE), the resulting time after a Distributed Time Service (DTS) clock synchronization. Computed time is the value that the clerk or server process computes according to the values it receives from several servers.

compute node

A Blue Gene core node on which user applications run.

A node that runs a virtual machine instance, which provides a wide range of services, such as providing a development environment or performing analytics.

An independent machine that contains one or more microprocessors, memory, storage, and network controllers and runs its own operating system and applications. See also integrated technology element.

A processing node in a parallel processing environment that handles elements of the job logic. Any processing node that is not a conductor node is a compute node. See also processing node.

computer assisted personal interviewing (CAPI)An interviewing method in which an interviewer, equipped with a computer to record the respondent's answers, meets face-to-face with the respondent.

computer assisted self-interviewing (CASI)An interviewing method in which respondents use computers to record their answers to questionnaires.

Computer Assisted Software Engineering (CASE)A set of tools or programs to help develop complex applications.

computer assisted telephone interviewing (CATI)An interviewing method in which an interviewer, equipped with a computer to record the respondent's answers, interviews the respondent by telephone.

computer graphicsThe use of a computer to produce visual representations of data, such as charts and multi-dimensional drawings by means of dots, lines, and curves.

Computer Science Network (CSNET)A large computer network, mostly in the United States but with international connections. CSNET sites include universities, research labs, and some commercial companies. CSNET has merged with the Because It's Time Network (BITNET) to form the Consortium for Research and Education Network (CREN).

computer-telephony integration (CTI)The use of a general-purpose computer to issue commands to a telephone switch to transfer calls and provide other services. Typically, CTI is used in call centers.

computer templateA template that defines the compliant state for installed software and software configuration on the system.

computer workstationA workstation that performs z/OS processing of jobs and started-task operations and that usually reports status to Tivoli Workload Scheduler for z/OS automatically.

computing system catalogIn DFSMShsm, the master catalog and any associated user catalogs used as sources during the audit process.

computing system RPQA customer request for a price quotation on alterations or additions to the functional capabilities of a computing system, hardware product, or device. The RPQ can be used in conjunction with programming RPQs to solve unique data processing problems. See also programming request for price quotation.

COM setup dataData that enables the PSF user to designate unique microfilm printing functions for AFP print jobs. The parameter values, structure, syntax, and semantics are defined by the COM manufacturer, not by IBM-controlled architectures.

concatenate

To join two character strings.

To link together.

concatenated data setA group of logically connected data sets that are treated as one data set for the duration of a job step.

concatenated expressionAn expression that combines column values or combines a column value with another value, using a concatenation operator.

concatenated fieldTwo or more fields that are combined to make one field in a logical file.

concatenated keyThe key that is constructed to access a particular segment. A concatenated key consists of the key fields, including that of the root segment and successive children, down to the accessed segment.

concatenationThe process of joining two characters or strings to form one string.

concatenation bitIn distributed transaction processing, high order bit of the first byte of the header of a GDS record.

concatenation operator

In REXX, an operator used to combine two strings into one by adding the second string to the right end of the first string. The concatenation operators for REXX are a double vertical bar (which concatenates without a blank) and the blank (which concatenates with a blank).

The symbol used to join two character data items. The concatenation operator is often represented as two vertical bars (||).

concentrator

Any device that combines incoming messages into a single message (concentration) or extracts individual messages from the data sent in a single transmission sequence (deconcentration).

In data transmission, a functional unit that permits a common transmission medium to serve more data sources than there are channels currently available within the transmission medium.

An FDDI node that has additional parts beyond those required for its own attachment to a FDDI network. These additional parts (type M) are for attaching other FDDI nodes (type S) in a tree topology. Primarily, a concentrator is used to allow more than two single attachment stations (SAS) to communicate. It can also connect multiple SAS to a dual attachment station (DAS) ring.

A class of objects and terms in a domain. For example, in a health care domain, concepts can include doctor, patient, symptom, and disease.

A class of entities that are represented by general metadata definitions rather than physical document standards.

concept extractionA text analysis function that identifies significant vocabulary items, such as people, places, or products, in text documents and produces a list of those items. See also theme extraction.

conceptual architectureThe most abstract form of specialization of an architecture, favoring coverage over precision, and specifying a finite set of types for components and for relationships in the system.

conceptual modelA representation of the key elements of an offering and their relationships. For systems, such as computers and computer software, the conceptual model conveys a user’s perspective of the system, including the elements of the system as perceived by users and what users can do with them.

concrete elementAn element for which the attribute abstract in its XML schema declaration has the value of false and which therefore might appear in an instance document. See also abstract element.

concrete factoryIn object-oriented programming, a class that is used to create instances of another class. A concrete factory isolates the creation of objects of a particular class into one place so that new functions can be provided without widespread code changes.

concrete typeA type that can be instantiated and is derived from an abstract type.

concurrencyThe shared use of resources by multiple interactive users or application processes at the same time.

concurrency control

The management of contention for data resources.

In a multi-user environment, a system of controls that ensure that modifications made by one person do not adversely affect another concurrent user.

concurrent

Pertaining to the occurrence of two or more activities within a given interval of time. Concurrent processes can alternately use shared common resources.

Pertaining to the shared use of resources by multiple interactive users or application programs at the same time.

concurrent accessSimultaneous access to a shared volume group or a raw disk by two or more nodes. In this configuration, all the nodes defined for concurrent access to a shared volume group are owners of the shared resources associated with the volume group or raw disk.

concurrent access volume groupA volume group that can be accessed by more than one host system simultaneously.

concurrent additionThe addition of hardware to a hardware unit while it is operational.

concurrent capable volume groupA volume group that can be varied on in either nonconcurrent or concurrent access mode in a cluster environment.

concurrent cold repairRepair to hardware that is electrically isolated from the running system. The hardware that is isolated has no resources that are being used by the system when the repair is started.

concurrent connection limitIn OSI, the maximum number of concurrent connections allowed for a given OSI Communications Subsystem node.

concurrent copy

A function that increases the accessibility of data by creating a consistent copy of the data concurrent with regular processing.

A function of the DFSMSdss component that is used to back up any collection of data at a point in time with minimum down time for the database or application that uses the collection of data.

concurrent hot repairRepair to hardware that is electrically connected to the system. The hardware being repaired might have resources that are being used by the system when the repair is started.

concurrent image copy (CIC)A batch utility program that is used to make a copy of OSAM data sets and VSAM entry-sequenced database data sets (DBDSs), whether or not IMS is running and the database is online.

concurrent installation of Licensed Internal CodeThe process of installing Licensed Internal Code in a device while the device is in use.

concurrent licenseA type of license, administered by the network license server, that can be used by different users from any node that is connected to a network license server. Concurrent licenses enable as many users to use a particular software product concurrently as there are licenses. See also concurrent offline license.

concurrent loginA login that occurs simultaneously with other logins. See also login.

concurrent maintenanceService or maintenance that is performed on a hardware unit in the system while the system is fully or partially operational.

concurrent media maintenanceService performed on a disk drive module (DDM) without losing access to the data.

concurrent offline licenseA type of license that allows authorized users to reserve a concurrent license for a certain number of days and to use it on a portable computer that is disconnected from the network. See also concurrent license.

concurrent repairRepair to hardware in a hardware unit while it is operational.

concurrent serverA server that can handle many connections at the same time. It can accept new connection requests while still processing the transactions started by previous requests. See also iterative server.

concurrent-use licenseA license that limits the number of users that can be connected to a resource concurrently.

Concurrent Versions System (CVS)An open-source, network-transparent version control system.

concurrent virtual shared diskA virtual shared disk that can be accessed at the same time by more than one server.

condensedIn SQL replication, a table attribute that indicates that the table contains current data rather than a history of changes to the data. A condensed table includes no more than one row for each primary key value in the table. As a result, a condensed table can be used to supply current information for a refresh.

condensed directory catalogA directory catalog optimized for small size and used primarily on Notes clients.

condensed printA print format where characters are smaller and spaced closer together horizontally, typically at a density of 17 characters per inch.

condensed typeA typeface in which all characters are narrowed, making them appear taller. See also expanded type.

condition

A specified term, its value, and an operator that are used for comparison with a contract. One or more conditions may be used to select an approval rule.

A database object that names an SQL exception or warning, optionally with an associated SQLSTATE, that can be signaled or referenced by a handler in SQL PL. See also module object.

An exception that has been enabled, or recognized, by the Language Environment and thus is eligible to activate user and language condition handlers. Conditions can be detected by the hardware/operating system and result in an interrupt. They can also be detected by language-specific generated code or language library code.

In a business state machine, an expression that guards the transition and allows transition to the next state only when and if the incoming operation evaluates to 'True'. Otherwise, the current state is maintained.

The state of an event, which might trigger a response.

In the Integrated Language Environment (ILE) model, a system-independent representation of an error condition within a high-level language (HLL). For an i5/OS program, each ILE condition has a corresponding exception message.

A test of a situation or state that must be in place for a specific action to occur.

A specified property, a value, and an operator that defines a comparison relationship between them. One or more conditions can be used to create a query or a conditional formatting specification. See also parameterized query.

An expression that can be evaluated as true, false, or unknown. It can be expressed in natural language text, in mathematically formal notation, or in a machine-readable language. See also selection.

The component of a policy expression that specifies the states for which a policy is relevant.

In REXX, a specific event, or state, that can be trapped by the REXX CALL ON or SIGNAL ON instruction.

The part of a standardization rule that defines the requirements that the record must meet for the rule to apply to that record. A pattern is a type of condition. See also action, pattern, standardization rule.

An expression that consists of an agent attribute, an operator such as greater than or equal to, and a value. It can be read as "If - system condition - compared to - value - is true". See also situation.

In an event definition, one or more criteria that must be true in order for the event to be executed. Any or all of the conditions may be configured as the requirement for event execution.

A situation that matches document attributes against decision points and routes the documents to different paths based on the specified attribute and value combinations.

The circumstances or state information of a managed resource that are examined during policy evaluation.

conditional access listIn RACF, an access list within a resource profile that associates a condition with a user ID or group ID and the corresponding access authority, allowing otherwise unauthorized access if the specified condition is true. See also access list.

conditional blockA compound statement that can run portions of a test depending on the value of a reference or field reference.

conditional branchA branch that is taken when a specified condition is met.

conditional breakpointA breakpoint where processing is suspended when a specified condition evaluates to TRUE. See also unconditional breakpoint.

conditional end bracket (CEB)

An SNA indicator in the request header, FMH5, denoting the end of a conversation between two transactions. See also begin bracket.

In SNA, the value (binary 1) of the conditional end bracket indicator in the request header (RH) of the last request of the last chain of a bracket; the value denotes the end of the bracket. See also end bracket.

conditional expression

A statement that compares the relationship (such as greater than or equal) of two items.

A compound expression that contains a condition (the first expression), an expression to be evaluated if the condition has a nonzero value (the second expression), and an expression to be evaluated if the condition has the value zero (the third expression).

In COBOL, a simple condition or a complex condition specified in an IF, a PERFORM, or a SEARCH statement.

conditional loopIn REXX, a loop that allows a set of instructions to be repeated either WHILE or UNTIL a specified condition is met.

conditional meanAn alternative method for choosing a reason code assignment. It is a reasoning strategy that the user specifies in the scorecard requirements, which evaluates every attribute’s possible value ranges. The reason codes are determined based on the expected value of the attributes and rank order. Typically, the four lowest expected and their corresponding reason codes are chosen. A conditional mean can be used in neural nets and fused scorecards.

conditional phrase

In REXX, a phrase in a DO instruction, introduced by the subkeyword WHILE or UNTIL, that is used to change the iteration of a repetitive DO loop.

In COBOL, a phrase that specifies the action to be taken on the determination of the truth value of a condition resulting from the running of a conditional statement.

conditional processingA page-definition function that allows input data records to partially control their own formatting.

conditional promptingA type of prompting that is provided by the system depending on the values selected by the user for other parameters. See also selective prompting.

conditional restartA DB2 restart that is directed by a user-defined conditional restart control record (CRCR).

conditional restart control record (CRCR)A queue of records in the bootstrap data set (BSDS) that is associated with a conditional restart of DB2 for z/OS. Each element in the queue indicates the choices that were made when the record was created and the progress of the restart operation it controls.

conditional routeA route between two steps in a workflow that is followed only when certain conditions are met.

conditional statement

In COBOL, a statement that controls program flow based on the result of the evaluation of a condition.

A statement that permits execution of one of a number of possible operations, with or without a transfer of control.

A statement used to express an assignment or branch based on specified criteria.

A statement that runs if a specified expression evaluates to a nonzero value.

conditional variableIn COBOL, a data item, one or more values of which has a condition-name assigned to it.

condition codeA code that reflects the result of a previous input/output, arithmetic, or logical operation.

condition columnThe condition part of a decision table.

condition-enabled itemAn item that has a value or worth that is assigned and tracked based on its physical condition.

condition handlingThe diagnosis, reporting, or tolerating of errors that occur while a routine is running.

condition information block (CIB)The platform-specific data block used by the Language Environment condition manager as a repository for data about conditions raised in the Language Environment run-time environment.

conditioning

In data communications, the addition of equipment to a nonswitched voice-graded channel to provide minimum values of line characteristics required for data transmission.

The use of indicators to control when calculations or output operations are to be performed.

The use of indicators in a program to control when calculations or output operations are done, or in a file, the use of indicators or condition names to control when certain functions or operations are done.

conditioning indicatorIn RPG, an indicator used to specify when to do calculations or which characteristics apply to a record format or field.

condition managerThe condition manager is the part of the common execution environment that manages conditions by invoking various user-written and language-specific condition handlers.

condition name

In COBOL, a name assigned to a specific value, set of values, or range of values within the complete set of values that a conditional variable can have.

For display files, a name used to control the selection of DDS keywords and display locations based on the model of the display station.

The name assigned to a status of a user-defined switch.

condition-name conditionIn COBOL, a statement that the value of a conditional variable is one of a set (or range) of values assigned to a condition name associated with the conditional variable.

condition nodeA node in a decision tree that defines a rule condition and groups a set of branches.

condition patternIn regular expressions, a pattern that the regular expression defines. The regular expression can be used to find items that match the pattern.

condition setA group of independent conditions where each condition describes all of the activities for an order to be performed in the warehouse.

condition stepThe step of the Language Environment condition handling model that follows the enablement step. In the condition step, user-written condition handlers, C signal handlers, and PL/I ON-units are first given a chance to handle a condition. See also enablement step, termination imminent step.

condition token

A 12-byte data structure, which is consistent across multiple Systems Application Architecture (SAA) participating systems, that allows the application programmer to associate the condition with the underlying exception message.

In Language Environment, a data type consisting of 96 bits (12 bytes). The condition token contains structured fields that indicate various aspects of a condition including the severity, the associated message number, and information that is specific to a given instance of the condition.

condition trapIn REXX, the method by which the explicit flow of processing in a REXX program can be changed. Condition traps are enabled or disabled using the ON or OFF subkeywords of the CALL and SIGNAL instructions.

condition variableAn object that allows a thread to suspend execution when it finds an untrue condition, and to resume execution when another thread makes the condition true.

conductor nodeThe processing node that initiates the job run. See also processing node.

conduitA plastic or metal piping system that is used to protect and route electrical wiring.

Conference on Data Systems languages (CODASYL)An organization founded in 1959 by the U.S. Department of Defense. CODASYL was known for its definition of COBOL, but it was also involved with the network database model and the data description language (DDL) for defining database schemas.

confidenceThe predicted probability of an answer being correct. Precision and accuracy are both related to the confidence metric produced by Watson for each possible answer it returns. Candidate answers are ranked by confidence; if the customized pipeline is providing high-quality answers, confidence should show a strong correlation with answer quality.

confidence factorA number between 0 and 100 indicating the level of accuracy of the trended value. The number 0 indicates no confidence. The number 100 indicates a perfect correlation between trended and actual measured values.

confidence scoreAn estimate of the accuracy of a prediction, usually expressed as a number from 0.0 to 1.0.

confidential informantA person who provides privileged information about a person or organization to an agency.

confidentiality

In computer security, assurance that sensitive information is not visible to an eavesdropper.

The security service that protects sensitive information from unauthorized disclosure. Encryption is a common mechanism for implementing this service.

configurable itemA product or item that offers different options from which a customer can select before purchasing that item. The choice of options or available combinations of options may be constrained so that customers can only choose certain combinations of options for their purchase.

configurable productA product that is available with different options. The options can be chosen based on the customer's requirements.

configurable serviceA service that requires the specification of parameters (other than a name and description), before they are ready to be used in a business process.

configuration

A type of decision, for both solicited and unsolicited interactions, that controls the properties of a managed resource.

The manner in which the hardware and software of a system, subsystem, or network are organized and interconnected.

The process of describing to a system the devices, optional features, and program products that have been installed so that these features can be used. See also customization, system customization.

configuration administrationThe administration of the configuration object types (CTs), configuration objects (COs), and configuration object sets (COSs) that comprise the configuration data of organizational units (OUs). This is carried out after the product has been installed and customized.

Configuration ApplicationA Systems Monitor feature that is used (a) to configure the Mid-Level Manager (MLM), the System-Level Manager (SLM), and the System Information Agent (SIA), (b) to reinitialize daemons, and (c) to control data retrieval and collection from remote nodes.

configuration eventNotifications about the attributes of an object. The notifications are generated when the object is created, changed, or deleted and also by explicit requests.

configuration file

In performance, a file that contains information about a collection as well as certain system attributes.

A file read during database server disk or shared-memory initialization that contains the parameters that specify values for configurable behavior. A database server and its archiving tool use configuration files. See also parameter.

A Struts file that contains information about data sources, form beans, global forwards, and action mappings.

configuration item (CI)Any component of an information technology infrastructure that is under the control of configuration management. See also asset.

configuration listA list of local or remote locations, network addresses, or pass-through device descriptions used by some types of communications descriptions. The system-recognized identifier for the object type is *CFGL.

configuration-managed item (CM item)A specialized item type that represents a part number that is under configuration management control as part of the reference engineering data.

configuration management

The control of information necessary to identify both physical and logical information systems and their relationship to one another.

The process of planning for, identifying, controlling, and verifying the configuration items within a service, recording and reporting their status and, in support of change management, assessing the potential impact of changing those items.

Configuration Management and Version Control (CMVC)A library management system that is used for code development projects.

Configuration Management Database (CMDB)A database that contains details about the attributes and history of each configuration item and the details about the relationships between configuration items.

configuration management system (CMS)A set of databases and tools that are used to manage configuration data. A CMS can include one or more CMDBs, plus data about changes, incidents, and other artifacts and processes. The CMS is maintained by the configuration management process and used by all service management processes.

Configuration ManagerThe component that provides an interface between the workbench and a set of runtime brokers. It provides brokers with their initial configuration, and updates them with any subsequent changes. It maintains the broker domain configuration.

configuration manager

A server that distributes configuration information, such as policies and schedules, to managed servers according to their profiles. Configuration information can include policy and schedules. See also enterprise configuration, managed server, profile.

A program to supervise device configuration during initial program load (IPL).

configuration nodeA node that acts as the focal point for configuration commands and manages the data that describes the clustered-system configuration.

configuration object (CO)An instance of a configuration object type (CT) that represents an object in an organizational unit (OU). Which attributes can be added to a CO is determined by the definition of the CT on which the CO is based.

configuration object set (COS)A set of configuration objects, used to limit the scope of configuration data provided to message flows.

configuration object type (CT)A description of the class of configuration objects, including the attributes that each member of this class can have.

configuration parameter

A variable that controls the behavior of the system or the behavior of all applications running on the system.

A parameter whose value limits or defines the resources that can be used by the database manager or a database. Some configuration parameters are informational and define characteristics about the environment that cannot be changed. See also database configuration parameter.

configuration profileA WebSphere Application Server container for runtime configurations that administer a particular set of services; for example, the deployment manager configuration profile administers a cell.

configuration report program (CRP)An SSP utility program that creates a configuration report that lists the network resources and resource attributes for networks with NCP, EP, PEP, or VTAM.

configuration report server (CRS)A function that resides on each ring in an environment of multiple token-ring networks in which configuration is being monitored. This function receives notifications about inserting and removing stations and notifications about active monitor failures.

configuration repository

A RIM repository that contains information stored by inventory scans and software distributions.

A storage area of configuration data that is typically located in a subdirectory of the product installation root directory.

configuration restartIn VTAM, the recovery facility used to restore the domain status after a failure or deactivation of VTAM, a major node, or the host processor.

Configuration Rules Object ClassAn object class that contains the configuration rules used by the configuration manager during initial program load (IPL).

Configuration SectionIn COBOL, a section of the Environment Division of a program, which describes the overall specifications of the source and object computers.

configuration serviceService activating, deactivating, and maintaining the status of physical units, links, and link stations. See also session services.

configuration shardIn a sharded deployment, a database shard that contains configuration data. It is shared by all the colonies that exist within an application version, and stores sourcing rules, routing guides, shipping preferences, and other business rules.

configuration specification (config spec)A set of rules that specify versions of artifacts. Commonly a configuration specification identifies at most one version of a given versioned artifact. See also artifact, configuration, version.

Configuration Test toolA Notes application that tests whether servers in an on-premises Domino environment are configured correctly to connect with servers in the SmartCloud Notes service.

configuratorSoftware that provides a dynamic rules-based kit (bundling) capability to determine a group of items that may be sold together. The configurator may also supply a price for the configuration. This grouping is based on pre-defined rules in addition to user interaction with the configurator. See also dynamic kit.

configure

To describe the interconnected arrangement of the devices, programs, communications, and optional features installed on a system.

To describe setting up auxiliary storage pools and checksum protection.

In storage, to define the logical and physical configuration of the I/O subsystem through the user interface that the storage facility provides for this function.

configured name bindingPersistent storage of an object in the name space that is created using either the administrative console or the wsadmin program.

configured test caseA test case that is used to run a test script for a specific test configuration.

configure methodTakes a device from the defined state to the available state. If a device has a device driver, the configure method is responsible for loading and binding the driver into the kernel. If the device supports the optional stopped state, the configure method takes the device from the defined state to the stopped state.

confirm

In X.25 communications, to respond to the arrival of a clear-indication or reset-indication packet.

In OSI, a service primitive issued by a service provider to complete the procedures associated with a confirmed service.

confirmationA transmission by a receiver that permits a sender to continue.

confirmation of delivery (COD)The automatic notification to the sender of a message, note, or document as to when action is taken on the message, note, or document. Confirmation of delivery must be requested by the sender.

confirmation of receipt (COR)The automatic notification to the sender of a message, note, or document that the receiver has accepted the message note or document.

confirmation panelIn DFSMSrmm, a panel that signals DFSMSrmm whether to continue or stop a delete or release action. Confirmation of delete or release requests is specified in the dialog user options.

confirmed instanceAn instance of an installed software product that has been explicitly assigned to one or more bundles.

confirmed serviceIn OSI, a service that indicates to the sender whether or not data or control information was properly received. A confirmed service involves a request, indication, response, and confirm service primitive. See also unconfirmed service.

confirm-on-arrival report (COA report)A WebSphere MQ report message type created when a message is placed on that queue. It is created by the queue manager that owns the destination queue.

confirm-on-delivery report (COD report)A WebSphere MQ report message type created when an application retrieves a message from the queue in a way that causes the message to be deleted from the queue. It is created by the queue manager.

conflict

In an infeasible model, a set of constraints that cannot all be true at the same time. See also relaxation.

A result that occurs when two simultaneous edit submissions are processed for the same object and where the intended outcome of the edit is unclear.

A situation in which two or more change sets independently modify the same item in a repository workspace.

conflict detectionThe process of determining whether a replicated change (an insert, an update, or a delete) is incompatible with some characteristic of a target. An incompatibility exists, for example, if changes were made to both a source and a target before replication occurred. See also master table, replica table.

conflicting referenceAn external reference from a Fortran or assembler language routine to a Fortran library routine with a name that is the same as the name of a C/C++ library routine. The reference is considered to be a conflicting reference only when the intended resolution is to the Fortran library routine rather than to the corresponding C/C++ library routine.

conformanceThe ability to unambiguously demonstrate that a particular implementation is correct with respect to its formal model.

conformance documentA document provided by an implementer (such as IBM) that contains implementation details as described in the current POSIX.1 standard.

conformance policyA subset of the ebMS specification that provides guidelines for secure and payload-agnostic exchange of B2B documents using web services. A conformance policy defines which profiles to use to validate whether received messages conform to the specified profiles.

conformant arrayIn DCE Remote Procedure Call (RPC), an array whose size is determined at runtime. A structure containing a conformant array as a field is a conformant structure.

conformed dimensionA dimension with a single definition that can be reused or shared across multiple coordinated data marts.

confounderA bit string that is used to initialize the encryption-block chaining value so that the encrypted result is different each time a data value is encrypted.

confusion matrixA table that provides a detailed numeric breakdown of predicted and actual answers. The table is used to evaluate model predictions for candidate answers.

congestion

A situation that occurs when network traffic exceeds a connection's bandwidth.

A network condition that occurs when a link or node is carrying so much data that the quality of service is degraded. Typical effects include queueing delay, packet loss, or the blocking of new connections.

congestion chargeA transportation fee that is charged to drivers for using roads during peak periods, encouraging drivers to use public transportation, reduce emissions, and lighten traffic congestion.

congruence classIn a cache, the group of lines to which a given memory location can be mapped.

conjoined namesA grouping of name segments that contains two or more given names, two or more titles, pairs of titles and given names, two or more entire names, or any combination of these name elements. For example, "Mr. and Mrs. John Smith" contains conjoined titles and "Mr. and Mrs. John and Mary Smith" contains conjoined titles and conjoined given names in the same construction.

conjunctionThe Boolean operation whose result has the Boolean value 1 if and only if each operand has the Boolean value 1.

connectIn a LAN, to physically join a cable from a station to an access unit or network connection point.

connect data set to line (CDSTL)In SNA, an option that determines how the data terminal ready (DTR) signal to the modem operates. It is used if a DTR indicates an unconditional command from the data terminal equipment (DTE) to the attached data circuit-terminating equipment (DCE) to connect to or remove itself from the network.

connectedIn VTAM, pertaining to the state of a physical unit (PU) or a logical unit (LU) that has an active physical path to the host processor containing the system services control point (SSCP) that controls the respective PU or LU.

connected employeeAn employee who participates in every aspect of enterprise social software.

A link between two process elements. Connections can be used to specify the chronological sequence of activities in a process.

A relationship between nodes in an Application Diagram.

A set of properties, such as host name, server launcher settings, and security settings that is required to communicate with a specific remote system.

The information required to connect to a database. The actual information required varies according to the DBMS and connection method.

A combination of two endpoints that the virtual private network (VPN) protects and a security policy. Such a connection can exist between any combination of a host and a gateway.

In Open Systems Interconnection architecture, an association established by a given layer between two or more entities of the next higher layer for the purpose of data transfer.

A feature that allows the question to connect to a business object within the application for pre-filling of answers and configure if a supplier or person master data should be updated upon submission of answer sheet by the respondent user.

In data communication, an association established between entities for conveying information. See also SQL connection.

connection affinityA channel attribute that specifies the client channel definition that client applications use to connect to the queue manager, if multiple connections are available.

connection aliasA short name used to identify a database connection.

connection brokerAn intermediary program that assigns a user to an available virtual desktop upon request.

connection concentratorA mechanism that allows applications to stay connected without any resources being used on the DB2 host server. Thousands of connections can be active while only a few agents are active on the DB2 host server.

connection contextIn SQLJ, a Java object that represents a connection to a data source.

connection control block (CCB)A control block created by CICS for each IRC session. The CCB contains control information for the inter-region connection and a pointer to the CSB.

connection declaration clauseIn SQLJ, a statement that declares a connection to a data source.

connection documentA document that enables communication between two servers and specifies how and when the information exchange occurs.

connection establishmentThe phase in connection mode that enables two data link service (DLS) users to create a data link connection between them.

connection event sequence (CES)This value is copied to full name (NCC) records and used by the path manager to determine the most current record pertinent to the tracking of full name (NKJE) connections.

connection factoryA set of configuration values that produces connections that enable a Java EE component to access a resource. Connection factories provide on-demand connections from an application to an enterprise information system (EIS) and allow an application server to enroll the EIS in a distributed transaction.

connection graphA graph that shows connections from remote network nodes and local IP addresses to local network nodes.

connection handle

The identifier or token by which a program accesses the queue manager to which it is connected.

A representation of a connection to a server resource.

The data object containing information that is associated with a connection that DB2 ODBC manages. This information includes general status information, transaction status information, and diagnostic information. See also handle, statement handle.

A value used to identify a resource. The value is returned to the connecting program after connect processing has established a session and must be used on subsequent requests to the resource.

A DB2 for z/OS identifier that is supplied by the attachment facility and that is associated with a specific address space connection.

connection keyA descriptor that identifies a subclass of devices that can connect to the intermediate device at the specified location.

connectionless modeA mode of transfer in which data is passed from one user to another in self-contained units with no logical relationship required among the units.

connectionless-mode network protocol (CLNP)The OSI protocol defined by ISO 8473. This protocol is used to provide the connectionless-mode network service (CLNS).

connectionless-mode network service (CLNS)In OSI, an unacknowledged network service that enables an entity to send a unit of data from a source service access point to one or more destination service access points without establishing a connection. The OSI protocol that provides this service in the Network Layer is defined by ISO 8473 (internet protocol, or IP).

connectionless-mode transmissionThe transmission of a single unit of data from a source service access point to one or more destination service access points without establishing a connection.

connectionless networkA network in which the sending logical node must have the address of the receiving logical node before information interchange can begin. The unit is routed through nodes in the network based on the destination address in the unit. The sending node does not receive an acknowledgement that the packet was received at the destination.

connectionless packet deliveryA method of data packet delivery that treats each packet of information individually and does not guarantee delivery.

connectionless protocolIn the Distributed Computing Environment (DCE), a remote procedure call (RPC) transport protocol, such as User Datagram Protocol (UDP), that does not require a connection to be established prior to data transfer. See also connection-oriented protocol.

A network service that treats each packet or datagram as a separate entity that contains the source address and destination address and for which no acknowledgment is returned to the originating source. Connectionless services are on a best-effort basis and do not guarantee reliable or in-sequence delivery. See also connection-oriented network service, connection-oriented service.

connection lineA line on the connection graph between a remote network node and a local network node or between two local network nodes.

connection listA communications object for ISDN that provides a list of information used to determine when to accept incoming calls and what information to send with outgoing calls. The system-recognized identifier for the object type is *CNNL.

connection locationA descriptor that identifies a specific location on the intermediate device where a child device can be connected.

connection management streamIn X.25, a special stream that receives all incoming connect indications destined for DLSAP addresses that are not bound to any other streams associated with a particular PPA.

Connection ManagerA daemon program that manages and redirects client connection requests based on service level agreements configured by the system administrator.

connection managerA Content Manager component that helps maintain connections to the library server, rather than starting a new connection for each query. The connection manager has an application programming interface.

connection modeA circuit-oriented mode of transfer in which data is passed from one user to another over an established connection in a sequenced manner.

connection modemIn Operations Console, a driver (cwbopaoc.inf file) that allows a console to connect to the server.

connection-mode network serviceIn OSI, an acknowledged network service that enables an entity to send a unit of data from a source service access point to a destination service access point by establishing, maintaining, and disconnecting a connection. The OSI protocol that provides this service in the network layer is defined by the X.25 Packet-Level Protocol defined by CCITT 1980 and 1984.

connection multiplicityA setting that controls whether multiple links between the same items are displayed as a single line, as directed lines, or as multiple lines. See also connection.

connection networkA switched network (such as a local area network, X.25, or public-switched dial network) that allows a local node to establish APPN connections to more than one undefined adjacent node.

connection-oriented network service (CONS)A type of networked data communication in which a dedicated connection between two peer entities is established before data is transferred. A connection-oriented service consists of three phases: establishment, data transfer, and release. The two networks exchange address information only while the connection is being established. See also connectionless service.

connection-oriented protocolIn the Distributed Computing Environment (DCE), a Remote Procedure Call (RPC) protocol that runs over a connection-based transport protocol. It is a reliable, virtual-circuit transport protocol, such as TCP. See also connectionless protocol.

connection-oriented serviceA service that establishes a logical connection between two partners for the duration that they want to communicate. Data transfer takes place in a reliable, sequenced manner. See also connectionless service.

connection pointAn object that identifies a specific workflow system and isolated region.

connection point managerIn SNA, a component of the transmission control layer that (a) performs session-level pacing of normal-flow requests, (b) checks sequence numbers of received request units, (c) verifies that request units do not exceed the maximum permissible size, (d) routes incoming request units to their destinations in the half-session, and enciphers and deciphers FMD request units when cryptography is selected.

connection poolA group of host connections that are maintained in an initialized state, ready to be used without having to create and initialize them.

connection pooling

A technique used for establishing a pool of resource connections that applications can share on an application server.

A process in which an application server or any product that interacts with a database on behalf of applications establishes a finite set of connections to the database and maps requests from the applications to this set of connections. Using these connections reduces the overall connection time for these applications and removes the cost of establishing a database connection from the host.

connection profile

A set of data that is used to establish a connection.

A data management file that contains parameters that associate other defined profiles to the connection of two logical units.

connection scriptData, such as sign-on and password information, that is exchanged between the host and remote systems when a connection is established.

connection stringA string that specifies the information to permit a workstation to access a particular database.

connection typeA field in the Predefined Connection Object Class that identifies the subclass of devices that can be connected to an intermediate device

connectiveIn COBOL, a word or a punctuation character that associates a data name, paragraph name, condition name, or text name with its qualifier; links two or more values in a series; or forms a conditional expression.

connectivity

The capability of a system or device to be attached to other systems or devices without modification.

An object class that is used for objects that connect different parts of the network and route or switch traffic between these parts. This class includes gateways, repeaters (including multiport repeaters), and bridges.

The degree to which storage controls are joined to a direct access storage device (DASD) and processors to achieve adequate data paths (and alternative data paths) to meet data availability needs.

An algorithm that determines if two machines on different networks can communicate. If the machines can communicate, connectivity also determines which host names should be used and which TCP/IP routing information must be added.

connectivity subsystem (CSS)An expansion frame, such as the 3746 Model 900, that extends connectivity and enhances the performance of the IBM 3745 Communication Controller.

connector

In Enterprise Service Tools, a well-defined, durable communication or programming interface to an enterprise information system. A connector provides a means of accepting data in a definable format, invoking an operation, and receiving results in a definable format.

A component that provides data connectivity and extraction capabilities for external data sources, such as relational databases or messaging software.

A servlet that provides a portlet access to external sources of content, for example, a news feed from a website of a local television station.

A plug-in that is used to access and update data sources. A connector accesses the data and separates out the details of data manipulations and relationships.

A component that provides data connectivity and metadata integration for external data sources, such as relational databases or messaging software. A connector typically includes a stage that is specific to the external data source. See also bridge, operator, plug-in.

An arrow that connects activities in a process diagram.

In a query management command, the TO word in the EXPORT command, the FROM word in the IMPORT command, or the AS word in the SAVE DATA command.

In Java EE, a standard extension mechanism for containers to provide connectivity to enterprise information systems (EISs). A connector consists of a resource adapter and application development tools (Sun). See also container.

An installed component that provides the interface between the engine and the Tivoli Dynamic Workload Console and the Job Scheduling Console. See also engine, job scheduling console.

connector class

Object-oriented programming class that provides standard access to APIs that are native to specific content servers.

An object class that is used for objects that connect different parts of the network and route or switch traffic between these parts. This class includes gateways, repeaters (including multiport repeaters), and bridges. See also network class.

connector packetThe set of data that is passed between the event processing server (runtime server) and external systems using the technology connectors.

connect phaseAn optional phase of link activation during which initial communication is established. It includes dialing and answering on switched links and can include modem equalization. The connect phase is followed by the optional prenegotiation phase or by the contact phase. See also prenegotiation phase.

connect-time accountingThe record of the amount of time each user spends logged in to the system.

consecutive processingA method of processing in which the records in the file are read, written to, or deleted in the order in which they exist in a file. See also random processing, sequential processing.

consigned inventoryAn enterprise's inventory that is owned by vendors. Ownership is transferred to the buyer at the end of the transaction.

consigneeThe company that receives the delivered goods from the shipper, which is known as the consignor. For example, the consignee might be a retailer or distribution center that receives deliveries from the manufacturing plant of the shipper.

consignmentA classification type for inventory materials that are stored on-site but that are owned by an external vendor. The vendor retains ownership of the consignment items until they are used and paid for by the organization that is storing them.

consignorThe shipper that delivers goods to the consignee.

consistencyA state of data. A transaction updates the data and checks its state. If the transaction detects any inconsistency, the change is rolled back and the data is returned to its previous consistent state. See also ACID property, ACID transaction.

consistency group

A group of copy relationships between virtual volumes or data sets that are maintained with the same time reference so that all copies are consistent in time.

consistency pointThe point in time when the application quiesces all buffers to a disk.

consistency tokenA unique identifier that is generated during precompilation, stored in the application source, and sent to the database when the package is bound. The consistency token is used to ensure the integrity of the shared application information that is stored in the database as a package.

consistent

A type of read integrity in which a program is permitted to read only committed data - data that cannot be backed out after it has been passed to the program issuing the read request. Therefore, a consistent read request can succeed only when the data is free from all locks. See also read integrity, repeatable.

consistent copyA copy of a data entity (a logical volume {LVOL}), for example) that contains the contents of the entire data entity at an instant in time.

consistent readAn integrity option that Virtual Storage Access Method record-level sharing (VSAM RLS) obtains for a share lock on a record. Consistent read ensures that the reader does not see an uncommitted change made by another transaction.

consistent read explicitAn integrity option that Virtual Storage Access Method record-level sharing (VSAM RLS) obtains for a share lock on a record; VSAM RLS then keeps the share lock on the record until the end of transaction. This option is available only to Customer Information Control System (CICS) transactions because VSAM does not recognize the end of transaction for non-CICS usage. This capability is also referred to as repeatable read.

console

In Linux, an output device for kernel messages.

A graphical user interface that simplifies the tasks for managing network security, such as monitoring events and scheduling scans.

A user interface that can be used to list and manage objects or entities, such as catalogs, hierarchies, and items. See also module.

A display station from which an operator can control and observe the system operation.

In COBOL, a function name associated with the operator's display station.

A user interface to a server, such as can be provided by a personal computer.

A user interface for one or more administrative tasks. For example, the Integrated Solutions Console integrates the administrative tasks for multiple products and solutions into a single console.

console authority levelA numeric value from 0 - 15 assigned to remote job processing (RJP) consoles, which governs the set of commands that can be issued from the console.

console communication service (CCS)The SNA facility that acts as an interface between the control program and the VSCS component of VTAM for VM.

console destination classOne of a set of named classes used to direct messages to certain consoles. Console destination classes also are used in specifying the messages to be received at a remote job processing (RJP) console.

console deviceDuring the installation of the Base Operating System (BOS), the system console is the display device at the system on which you are installing the software.

console displayA display at a system console on which an operator can display, send, and reply to messages and use all control commands.

console eventAn event sent by a monitor to a console.

console moduleA package of web-based applications, developed as standard portlets, that are installed into Integrated Solutions Console and displayed by the console to provide an interface for administering software and computer networks and resources.

console module deployment descriptorAn XML file that describes the following elements that need to be known when a console module is included in the Integrated Solutions Console framework: navigation tree contributions, page layout definitions, access control information, prerequisite portlet or console modules, and extension points.

console resourceAn element of the console that can be managed. Console resources include pages, portlets, roles, and views.

console serverThe hardware device through which the management server opens a remote console session for a node.

console serviceA dynamic support program (DSP) that performs traffic management for consoles.

consolidateTo compute a relationship for one or more hierarchies of data. For example, consolidating the total sales for January, February, and March by adding them together results in the total sales for Quarter 1.

consolidated data streamA data stream table that captures data streams from different, but similar data stream sources and combines them into a single data stream.

A process that is used to group similar database objects from disparate sources or the same source into a common record.

The process of manually combining orders and shipments into larger loads.

The process of combining two or more duplicate records from a structural data source into a single record in the cube. See also duplicate record.

consolidation processA process during which the data collectors process the nightly accounting and storage files that were created by the data collection scripts and produce an output CSR file.

consolidation structureA legal or management structure that consists of a company structure and extended dimension structures.

Consortium for Research and Education Network (CREN)A large computer network that was formed from the merging of the Because It's Time Network (BITNET) and the Computer Science Network (CSNET).

CONS pathIn OSI, a path that indicates both quality-of-service values through a network QOS mode and values to indicate how splitting and multiplexing is to be accomplished. A CONS path can optionally be reserved for outbound communications to a specific DTE at an adjacent node.

CONS path setIn OSI, a path set used when the connection-mode network service is used.

constant

A language element that specifies an unchanging value. Constants are classified as string constants or numeric constants.

A standard rule that enables the movement of a literal constant value to a specified element or field, to indicate a qualifying relationship with another element or field, and map the current date or time to the specified element or field.

In a business object model (BOM), a vocabulary element that verbalizes the public static final attribute of a class with the same type as the BOM class. See also verbalization.

Data that has an unchanging, predefined value to be used in processing.

constant dataIn printers, data that does not change; for example, the company letterhead and standard text in form letters, or the headings and boxes on a preprinted form. See also variable data.

constant expressionAn expression that has a value that can be determined during compilation and that does not change during the running of the program.

constant field

A field defined by a display format to contain a value that does not change.

In an externally described display or printer file, an unnamed field that contains actual data that is passed to the display or printer but is unknown to the program passing it.

constant propagationAn optimization technique where constants used in an expression are combined and new ones are generated. Mode conversions are done to allow some intrinsic functions to be evaluated at compile time.

constant special item ID list (CSIDL)In Windows environments, a list that identifies frequently used special folders whose location might vary on different systems.

constant standard ruleA rule that enables the user to move a constant value to the specified field, indicate a qualifying relationship with another field, and map the current date or time to the specified field.

constant symbolIn REXX, a symbol that starts with a digit (0-9) or a period. The value of a constant symbol cannot be changed.

ConstraintIn AIXwindows, a class of objects from which a unique resource set can be inherited. For example, a PanedWindow widget can specify the size of its children by using the inherited XtNmin and XtNmax Constraint resources. The reference material associated with each widget specifies those that inherit resources from the Constraint class.

constraint

A place in the system where contention for a resource is affecting performance.

In NetDA/2, the set of essential requirements that are specified with the node, connection, or application definitions. A change in a constraint value changes the input to the network design. See also parameters.

A security specification that denies one or more users the ability to access a model component or to perform a modeling or authoring task.

A limit to set controls on the start and finish dates for project tasks, such as start-no-earlier-than or finish-no-later-than.

A condition that must be satisfied by the solution of a problem. A constraint may be arithmetic, requiring that a solution satisfy certain numeric properties, or symbolic, requiring that a solution meet other properties, such as membership of a collection, uniqueness, or cardinality. See also requirement.

constraint blockAn element that defines a generic or basic mathematical formula. Constraint blocks can be used to create parametric diagrams.

constraint cycleA sequence of constraint relationships in which a descendent of a parent file becomes the parent to the original parent file.

constraint programming (CP)A nondeterministic method of computer programming that is based on logic and symbolic reasoning to solve intractable problems. It offers a technique for solving combinatorial problems based on applying constraint propagation on the domains of decision variables. Commercially, it offers a means of representing business rules as constraints, goals, wishes, preferences, strategies, and criteria. See also mathematical programming.

constraint propagationA process that dynamically reduces the domain of each variable in a problem. Modifications in the domain of one constrained variable may have implications for the domains of other constrained variables. Constraint propagation involves transmitting these implications and carrying out their effects.

construct

A detailed record of a request from a data repository.

In architecture, an architected set of data such as a structured field or a triplet.

In the context of OSLC, an application that can retrieve and process the resource data that is shared by a provider application.

An application that uses the data in the central data warehouse for a specific business need. Consumer applications use reporting and third-party online analytical processing (OLAP) tools as well as planning, trend-tracking, analysis, accounting, and data mining tools. See also source application.

consumer customerA Business-to-Customer business scenario, where the customer is an individual or group of individuals and are modeled in Sterling Field Sales or Sterling Business Center as a contact and do not have any buyer organizations associated with them.

consumer directThe consumer direct business model supports commerce transactions involving products, services, or information between businesses and consumers. Consumers typically purchase goods or services directly from a business in a consumer direct scenario. The Madisons starter store is an example of a consumer direct business. See also B2B direct business model, direct sales business model.

consumer packaged goods (CPG)Consumable goods such as food and beverages, apparel and footwear, cleaning products, and tobacco related products. Consumer goods are products that are used regularly and need to be replaced frequently.

An individual in the Emptoris suite of applications who is associated with an organization. In Emptoris Contract Management, a contact is also associated with a contract for administration purposes within the contract and can receive notifications.

A person whose ID is configured to receive email or pager notifications of DB2 administration messages that are written to the administration notification log. The definition for each contact contains the name and the email or pager address of the person to receive notifications and is stored in the contact list of the system that is specified by the CONTACT_HOST configuration parameter of the DB2 administration server. See also administration notification log, administration notification message, orphaned contact.

A named email address to which reports and agent e-mails can be sent. Contacts are never authenticated.

contact historyA complete historical view of a company’s marketing communications. The contact history includes targets that are contacted through campaigns; hold-out controls who do not receive a communication but are measured for comparison purposes against the target group, and the exact version offer that is given to each ID, including the values of personalized offer attributes.

contact listA directory database that is stored on a Notes client and contains the names and addresses of users and groups added by Notes users.

contact phaseA phase of link activation during which negotiation-proceeding XID3s are exchanged between the connected link stations to establish the primary and secondary roles of the link stations, the TG number to be used, and other characteristics of the link, and during which the mode-setting command is sent and acknowledged after the primary and the secondary roles are established. Link activation may consist only of the contact phase, or it may also have either a connect phase or a prenegotiation phase or both preceding the contact phase. See also prenegotiation phase.

contained folderA contract folder that is a child of a parent folder.

contained termA term in a category in a business glossary. A term must be contained by only one category.

container

A data storage location, for example, a file, directory, or device. See also table space.

A specialized logical storage space that resides in a dbspace and stores time series data for the TimeSeries data type.

A virtual software object that encompasses all of the elements that are needed for an application to run within an operating system. See also image, registry.

A software object that holds or organizes other software objects or entities.

An entity that provides life-cycle management, security, deployment, and runtime services to components. (Sun) See also connector, resource adapter.

An object that holds entries. A container can be a catalog, containing items, a hierarchy, containing categories, or a collaboration area, which will hold items or categories only (depending on the type of the container with which it is associated). See also category, collaboration area, hierarchy, item.

An item that can contain other items. Tags that are added to a container inherit the position of the container.

A worldwide dimensional standard for a reusable transportation vessel that can be hauled like a trailer, loaded onto a container ship, or loaded onto a freight train for transportation. The container can be loaded with cartons and sealed at the shipping dock for protection during transport.

A column or row that is used to arrange the layout of a portlet or other container on a page.

In a virtual tape server (VTS), a receptacle in which one or more exported logical volumes (LVOLs) can be stored. A stacked volume containing one or more LVOLs and residing outside a VTS library is considered to be the container for those volumes. See also stacked volume.

In CoOperative Development Environment/400, a system object that contains and organizes source files. An i5/OS library or an MVS-partitioned data set are examples of a container.

container classIn Backup, Recovery, and Media Services, an object that defines the types of physical containers that are used to store and transport removable media. Container classes are distinguished by attributes such as capacity and media class.

containerizationUsing standardized containers for the storage and transport of loose units from a warehouse.

container load plan (CLP)A plan that specifies how items are placed in a container to maximize use of space.

container-managed persistence (CMP)The mechanism whereby data transfer between an entity bean's variables and a resource manager is managed by the entity bean's container. (Sun) See also bean-managed persistence.

container-managed transactionA transaction whose boundaries are defined by an EJB container. An entity bean must use container-managed transactions. (Sun)

The data semantics of a message that is received by the dynamic assembler.

content area

In a web page that is based on a page template, the editable region of the page.

In an editor, the working area that can be used to create or edit source.

content assistA feature of some source editors that prompts the user with a list of valid alternatives for completing the current line of code or input field.

content-based retrieval (CBR)The process of searching for documents based on their content in addition to, or instead of, searching on properties.

content based routing (CBR)An optional feature of the caching proxy that provides intelligent routing to back-end application servers. This routing is based on HTTP session affinity and a weighted round-robin algorithm.

content cache areaA storage area that holds temporary copies of files retrieved from remote file storage areas, as well as content retrieved from local or remote database storage areas. See also content storage area.

content captureA process that captures a configurable amount of payload and then stores the data in a flow log.

content elementA unit of information that is a semantic representation of the subject and that is used in building the structure of an information type. Each information type defines a standard set of content elements. Content elements are defined by a schema or document type definition (DTD), which include required and optional properties that define the content element and which are used to structure the information types.

content eventAn event that responds to document or folder changes on an Enterprise Content Management (ECM) system. See also event.

contention

A condition on a session when two programs try to start a conversation at the same time. See also control operator.

A situation in which a transaction attempts to lock a row or table that is already locked.

In a local area network, a condition on a communications channel when two or more stations are allowed by the protocol to start transmitting concurrently and thus risk collision.

contention loserOn an LU-LU session, the LU that must use an SNA BID command (LUTYPE6.1) or an LUSTATUS command (APPC) to request permission to begin a conversation.

contention-loser sessionTo a network accessible unit (NAU), a session for which it was defined during session initiation to be the contention loser. See also contention-winner session.

contention modeIn data communication, a mode of transmission in which any station may transmit whenever the line is available, This occurs when a session is between brackets. If stations transmit simultaneously, protocols determine who wins the contention.

contention polarityThe role of each LU when contention occurs for use of a session. One LU is the contention winner and the other LU is the contention loser.

contention scopeThe group of threads against which a given thread must compete for the CPU. If local, the thread competes against other threads in the same process. If global, the thread competes against all other threads in the system.

contention stateIn data communications, a type of half-duplex line or data link control in which either user may transmit any time the line or link is available. If both users attempt to transmit at the same time, the protocols or the hardware determines who goes first.

contention winnerOn an LU-LU session, the LU that is permitted to begin a conversation at any time.

contention-winner sessionTo a network accessible unit (NAU), a session for which it was defined during session initiation to be the contention winner. See also contention-loser session.

contentless documentA document with properties, but no content, that is typically used to track a physical item, such as a video tape.

content localeA code that is used to set the language or dialect used for browsers and report text, and the regional preferences, such as formats for time, date, money, money expressions, and time of day.

content management

Software designed to help businesses manage and distribute content from diverse sources.

The process of managing, organizing, storing, tracking ownership of, and distributing information that was created for a common purpose.

Content Management Interoperability Services (CMIS)An open standard designed to facilitate the interoperability of content management systems using web protocols.

Content Manager (CM)The service that retrieves information from the content store, and saves information to the content store.

content modelThe representation of any data that may be contained inside an XML element. There are four kinds of content models: element content, mixed content, EMPTY content and ANY content.

content paneAn interactive pane in the contract language view that lists the clauses of a contract, in sequence, along with indicators of required actions, and other clause properties. It is used to navigate to a particular component of the contract and allows mapping of text from the contract language to clause templates and term definitions in the contract template. See also outline.

content particleAn element type that defines a choice, sequence, or activity. A content particle can only contain one pcdata. These objects can repeat in sequence until the content particle data ends or the maximum number of times the loop is allowed to repeat is exhausted. A content particle can not be referenced by standard rules or links.

content planA planning document that is used by a content provider to manage delivery of that type of content, for example: information developers produce an ID information plan.

content provider

An individual or team who produces content, for example: ITSO representatives, developerWorks brand content teams, and information development teams.

A source for content that can be incorporated into a portal page as a portlet.

content serverA software system that stores multimedia and business data and the related metadata required for users to work with that data. Content Manager and Content Manager ImagePlus for OS/390 are examples of content servers.

content spoofingAn attack technique used to trick a user into believing that certain content appearing on a website is legitimate and not from an external source.

content spotA class file that is added to a JSP file to designate display of personalized data or content. Each content spot has a name and will accept a specific type of data from a rule.

The database that contains the data needed to operate, such as report specifications, published models, and security rights.

A repository that is used to hold specifications of reports, models, and data sources.

A database that is used to store files and other content that users add to their activities.

contents viewA view of an object that shows the contents of the object in list form. Container views are provided for containers, and for any object that has container behavior, for example, a device object such as a printer. Icons view and details view are examples of contents views.

context

A named part of the CICSPlex SM environment that is currently being acted upon by CICSPlex SM. For configuration tasks, the context is a CICSPlex SM address space (CMAS); for all other tasks, it is a CICSplex. See also scope.

A set of one or more grammars that are enabled and used during a recognition action.

An element in an XBRL instance document that defines the entity, period, and scenario that provide understanding for the values of items.

The address space for a process, hardware registers, and related kernel data structures.

The means that are used to group tracking data as part of a transaction flow.

An object created for a service request in the business service model. The object contains one or more of the following details of information captured from the metadata: a business process, organization, role, channel, and domain specific information. See also context propagation.

An application's logical connection to the data source and associated DB2 ODBC connection information that allows the application to direct its operations to a data source. A DB2 ODBC context represents a DB2 thread.

The hierarchy of elements within which an element exists. For example, the context of a term in a business glossary is the hierarchy of categories in which the term is contained.

One or more units of recovery, with the associated application programs, resource managers, and protected resources. A context represents a work request in an application, and the life of a context consists of a series of units of recovery.

The information about an issue that is captured during a scan.

context addressA regular expression enclosed in slashes (/).

context authorizationThe authority for the owner of a human task to access the BPEL process that contains the human task.

context-aware searchA search function that uses natural language terms to search for work items and source code in Java, C, C++, and COBOL. Regular expressions and wildcard characters are not required.

context data

A set of data values describing the context at the capture point in a running system; for example, the transaction ID, the user ID, and the current program.

Input data that is passed with a scoring request in real time. For example, when a score is requested for a customer based on credit rating and geocode, the credit score and geocode will be the context data for the request.

context definitionA set of events, each with an associated context ID, that is used as a group for complex event processing. Rules that are associated with the events can be part of the context definition. Actions that are fired by the rules are also part of the context definition. See also context instance.

Context Dependent Scoring analysis engineAn analysis engine or annotator that creates machine learning features based on the question text, the answer, and the context in which the answer appeared, such as a passage.

context handleIn the Distributed Computing Environment (DCE) Remote Procedure Call (RPC), a reference to a client context maintained across remote RPCs by a server on behalf of a client.

context lineIn the Performance Toolbox, menu items ending in a slash and three dots (/...). The slash and three dots signify that the line itself represents a list at the next hierarchical level. See also statistic line.

context nameThe name given to a context in a context profile used for WebSphere Voice Server.

context organizationThe organization that is being administered at a given point in time.

context positionThe position of the context item within the sequence of items. See also context item.

context profileDescribes to the WebSphere Voice Server process which contexts should be loaded into an engine. A DirectTalk for Windows application specifies which context profiles to load into the engine it has reserved.

context propagationIn a multiple service transaction, the information about the details of a service request that passes from one invocation to another via the message header. See also context.

context rootThe web application root, which is the top-level directory of an application when it is deployed to a web server.

context-scoped business objectA summary object or accumulating array object that is used to share data from events across events in a context.

context securityOn z/OS, the authority checks that are performed when an application opens a queue and specifies that it will set the context in messages that it puts on the queue, or pass the context from messages that it has received to messages that it puts on the queue.

context-sensitive helpHelp information about the specific choice or object that the cursor is on. The help is contextual because it provides information about the item in its current context. See also extended help.

context servicesThe z/OS system component that provides services used to track a work request and allow a resource manager to express interest in the work request.

context sizeThe number of items in the sequence of items that is currently being processed. See also focus.

context structureAn ordered group of variables specifying the interface properties (notably location) of a shadow widget.

context switchThe activation of a process or activity either in a separate unit of work from the requestor or with the transaction attributes specified on the DEFINE PROCESS or DEFINE ACTIVITY command, rather than with those of the requesting transaction. The relationship of the process or activity to the requestor is as between separate transactions, except that data can be passed between the two units of work. A context switch occurs when a process or activity is activated by a RUN command, but not when it is activated by a LINK command.

contextual assistanceThe type of user assistance that is readily accessible from the product and that provides information about the user interface element with which the user is interacting. A context-sensitive help system is one implementation of contextual assistance, but contextual assistance can be provided in a variety of ways. For example, contextual assistance includes hover help, field-level help, and other user interface topics.

context variableOne of a set of variables in an automation context.

contiguous itemIn COBOL, an elementary or group item that is adjacent to another elementary or group item in the Data Division, contained in the same data hierarchy.

contiguous spaceAn unbroken consecutive series of storage locations.

contingency capacityFor thin-provisioned volumes that are configured to automatically expand, the unused real capacity that is maintained. For thin-provisioned volumes that are not configured to automatically expand, the difference between the used capacity and the new real capacity.

contingent allegianceIn mainframe computing, a relationship that is created in a control unit between a device and a channel when the channel accepts unit-check status. Contingent allegiance causes the control unit to guarantee access; that is, the control unit does not present the busy status to the device. It also enables the channel to retrieve sense data that is associated with the unit-check status on the channel path associated with the allegiance. See also implicit allegiance, reserved allegiance.

contingent resourceMonies or time placed in reserve to accommodate assessed project risks.

A character represented by a plus sign (+) that lets a command be extended to more than one line.

In REXX, a character represented by a comma that lets a clause be extended to more than one line. This character is functionally replaced by a blank and cannot be used in the middle of a string or comment.

continuation handleA value, which is passed between a high-level language program and a list application programming interface (API), used to mark the last value put in the user space.

continuation line

In RPG, additional lines specified on the file description specifications to provide more information about the file being defined.

In RLU, a report line or sample line that is part of a record format or a group of sample lines excluding the first line in the record format or group of sample lines.

A line of a source statement where characters are entered when the source statement cannot be contained on the previous line or lines.

An additional line (or lines) required to continue the coding of a CL command or a DDS keyword and its value.

continuation modeIn VTAM, the state of a conversation or session, which is either continue-any mode or continue-specific mode.

continuation processorA set of ODF programs that search the DST for reports that are ready to print when the continuation/wait indicator for a distribution is C (continued) or the DRT status has been changed to continued by an initiate transaction from the RL panel.

continue-any modeA state into which a session is placed that allows its input to satisfy a request issued in any-mode or specific mode. See also any-mode.

continued-entry fieldIn DDS, a panel element that contains a field that contains a set of associated entry fields.

continue-specific modeA state into which a session is placed that allows its input to satisfy only requests issued in specific mode.

continue statementA C language control statement that contains the keyword continue and a semicolon.

Continuous Association Rule Mining Algorithm (CARMA)An association algorithm that extracts a set of rules from the data without requiring input or target fields to be specified. See also antecedent, consequent.

continuous codeIn architecture, a bar code symbology characterized by designating all spaces within the symbol as parts of characters, for example, Interleaved 2 of 5. There is no intercharacter gap in a continuous code. See also discrete code.

Continuous Data Protection (CDP)A tool that records all activity between snapshots, permitting the restoration of a system to a point in time.

continuous delivery (CD)A software development practice that employs techniques such as continuous testing, continuous integration, and continuous deployment so that new features and fixes are packaged and deployed rapidly and at low risk to test environments and then to customers.

continuous-form mediaIn architecture, connected sheets; for example, sheets of paper connected by a perforated tear strip. See also cut-sheet media.

continuous formsA series of connected forms that feed continuously through a printing device. The connection between the forms is perforated so that the user can tear them apart. Before printing, the forms are folded in a stack, with the folds along the perforations. See also cut form, cut-sheet paper.

continuous integration (CI)A software development practice where members of a team integrate their work frequently so that there are multiple integrations each day. Integrations are verified by an automated build to detect integration errors as quickly as possible.

continuously collected electronic presenceAn attacker's online identity as a collection of digital impressions that are linked.

continuously powered main storage (CPM)The function of supplying power only to main storage (cards) for a varied amount of time (for example, one day) when utility power is lost on systems that have a system power control network (SPCN).

continuous moveTwo or more shipments that shippers string together to obtain a discount from a carrier. See also round trip.

continuous replenishmentA strategy of replenishment that monitors the physical inventory in the reserved location, and based on the minimum and maximum configuration, releases replenishment tasks for execution when inventory falls below the minimum (trigger) level.

continuous speech recognitionRecognition of words spoken in a continuous stream. Unlike isolated or discrete word recognition, users do not have to pause between words. See also discrete word recognition.

continuum of careAn integrated system of healthcare that guides and tracks patients over time through a comprehensive array of health services that spans all levels of intensity of care including wellness, episodic care, chronic care, care management, and end-of-life care.

contourA map of scheduled work and its distribution over time, for example, 4 hours per day, every second day for 2 weeks.

contouringThe process of mapping scheduled work over time. For example, work on a task might be scheduled for 4 hours per day, every second day for 2 weeks.

contract

In WebSphere Commerce, an agreement representing the terms and conditions that apply to a transaction.

A legal document that is created based on the mutual understanding of the organization and the service provider for availing telecom services.

The set of business policy assertions that have to be met by service provider at run time based on the context and content.

A legal agreement between two parties. The common representation of an authored contract, filed contract, quote contract, or authored amendment contract. A contract begins as a draft version, and is either withdrawn or is executed. See also amendment contract, executed contract.

A set of information about a software license for a product or products, its cost and entitlement period. When a contract is assigned to a computer group, it indicates which computers are entitled to the licenses described by that contract.

An agreement that contains all of the essential pricing and rating information for a specific carrier. A shipper can define one or more contracts for each carrier.

contract categoryThe classification of a contract. A contract may be a purchase agreement, sales agreement, or other.

contract languageThe language of a contract which consists of various clauses, terms, and lines.

contract lineA line item that is applied to an executed contract.

contract lock holderThe first user to open a contract, thereby locking it and preventing other users from making changes.

contract natureThe classification of a contract as null, local, or global.

contract noticeA call for requests from prospective suppliers or service providers, to submit tenders for a procurement activity that the contracting authority is interested in.

contractor classificationA division or grouping of contractors based on location.

contract presenterThe internal user who last presented an authored contract or authored amendment contract to an external party.

contract templateThe basis for an authored contract or authored amendment. It may contain contract clauses, contract folders, events, security lists, terms, a contract class, a contract category, line definitions, approvals list, and other information. See also template.

contributing testA test that examines the risk indicators that are specified in a question.

contribution

Data that is entered into an e.List in the Contributor application.

The primary asset that can contain Service Component Definition Language (SCDL) with composite definitions, as well as artifacts such as Java classes and Web Services Description Language (WSDL) and XML Schema Definitions (XSD).

contribution calculationThe ability to view a financial amount contributed from the top level in a company hierarchy.

contribution versionA summary of preferred automatic journal types that is used in reports.

contributorA designated user who can process an assigned change request and take it to completion. Once the contributors complete the change requests, they move them to a completed status.

Contributor Administration ConsoleA tool that enables administrators to publish an Analyst business model to the Web, manage access settings and model distribution, and configure the user's view of the model.

control

In WebSphere MQ and VisualAge RPG, the result of selecting a part from the parts palette and placing it on the design window. An example of a control is an entry field.

A component of a graphic interface that allows a user to select choices or type information. For example, list boxes, check boxes, push buttons, and entry fields.

control accessIn the Distributed Computing Environment (DCE) Cell Directory Service (CDS), an access right that grants users the ability to change the access control on a name and to perform other management tasks, such as replicate a directory or move a clearinghouse. See also clearinghouse.

control analysisA type of analysis that displays variations in values of the business measures over a specific period of time. This type of analysis reduces data variation, and is often used for quality control. Allowable variation is three times the standard deviation of the data.

control area (CA)

In the Virtual Storage Access Method (VSAM), a group of control intervals used as a unit for formatting a data set before adding records to it. In a key-sequenced data set (KSDS), each CA is pointed to by a sequence-set index record, and used by VSAM for distributing free space and for placing a sequence-set index record adjacent to its data. See also control block.

control argument typeAn option that can be configured for the check box, the drop-down list, and radio input control UDF type.

control block

A storage area used by a program to hold control information.

In CICS, a storage area used to hold dynamic data during the execution of control programs and application programs. See also control area, control table.

In the IBM Token-Ring Network, a specifically formatted block of information provided from the application program to the Adapter Support Interface to request an operation.

control blocks in common (CBIC)A facility with which a user can open a Virtual Storage Access Method (VSAM) data set so that the VSAM control blocks are placed in the common service area (CSA) of the MVS operating system. CBIC provides the capability for multiple memory accesses to a single, VSAM, control structure for the same VSAM data set.

control boundaryA call stack entry used as the point to which control is transferred when an unmonitored error occurs or a high-level language termination verb is used. A control boundary can be either of the following: a) any Integrated Language Environment (ILE) call stack entry for which the immediately preceding call stack entry is in a different activation group, or b) any ILE call stack entry for which the immediately preceding call stack entry is an original program model (OPM) program.

control breakIn RPG, a change in the contents of a control field that indicates all records from a particular control group were read and a new control group is starting.

control character

A character whose occurrence in a particular context initiates, modifies, or stops a control function. See also carriage control character.

A character that by itself or as the start of a sequence is a representation of a control function in a particular context. The coded representation of a control character consists of a single bit combination.

control command

In WebSphere MQ on UNIX and Linux systems and WebSphere MQ for Windows, a command that can be entered interactively from the operating system command line. Such a command requires only that the WebSphere MQ product be installed; it does not require a special utility or program to run it.

A command that allows conditional or looping logic flow in shell procedures.

control cubeA cube that contains the structural information used to combine multiple time-segmented PowerCubes into a time-based partitioned cube.

control databaseIn Tivoli Enterprise Data Warehouse, the component that contains the metadata that describes the data in the warehouse, including the source of the data, how the data was transformed before being placed in the warehouse, when the data was collected, and the formats used to publish the data (for example, the star schemas used to create Tivoli Enterprise Data Warehouse data marts).

control data set IDIn DFSMSrmm, a 1 - 8 character identifier for the DFSMSrmm control data set (CDS) used to ensure that, in a multi-system, multi-complex environment, the correct management functions are performed.

control data structuresData structures needed to manage file data and metadata cached in memory. Control data structures include hash tables and link pointers for finding cached data; lock states and tokens to implement distributed locking; and various flags and sequence numbers to monitor updates to the cached data.

control deskThe Tivoli NetView interface that enables the network operator to group application instances.

control enclosureA hardware unit that includes the enclosure chassis, node canisters, drives, and system function.

control field

In AFP Utilities, an input field on the screen view that is used to move the image area up, down, left, or right.

In Application Development ToolSet, one or more specified fields that are compared to determine the record sequence in the output file.

In RPG, one or more fields that are compared from record to record to determine when the information in the fields changes. When the information changes, the control level indicator (L1 through L9) assigned to a control field is set on.

In data communications, a field within a frame that contains the commands, responses, sequence numbers, and poll or final bit for data link control.

control file

An automatically generated file that records process specifications and the success or failure of processing.

A file that is used to specify additional options that the command line does not support.

In DFSMShsm aggregate backup and recovery processing, one of three aggregate files generated by the aggregate backup process. It contains the catalog, allocation, volume, and related information necessary to perform aggregate recovery.

Transmission of control indicators over a link when there is no user data available to send. This is often necessary during complex procedures, such as establishing synchronization points.

control function

In TELNET, the standard representation for interconnection functions. The i5/OS implementation of these functions includes IP, AO, AYT, and SYNCH.

A command to a processing component represented by a single bit combination (a control character) or a sequence starting with a control character followed by the parameter values for the command. Some examples of such functions are: Horizontal Tabulation, nul-terminated text strings in C, End of File, or ESCape sequence indicating change in Colour for the following text.

A function that identifies how tasks are managed and how resources are allocated by defining default options once.

An element of a character set that affects the recording, processing, transmission, or interpretation of data, and that has a coded representation of one or more bit combinations (see ISO/IEC 6429).

control groupIn Backup, Recovery, and Media Services, a group of libraries, special values, special operations, and lists that share common characteristics and are processed together due to their similar process cycles. The control groups used are backup control groups and archive control groups.

control initiate (CINIT)A network services request sent from a system services control point (SSCP) to a logical unit (LU) asking that LU to establish a session with another LU and to act as the primary end of the session.

control instructionIn architecture, a data construct transmitted from the controlling environment and interpreted by the environment interface to control the operation of the graphics processor.

control interval (CI)

A fixed-length area of direct access storage in which VSAM stores records and creates distributed free space. The control interval is the unit of information that VSAM transmits to or from direct-access storage. A control interval always includes an integral number of physical records.

In a key-sequenced data set or file, the set of records that an entry in the sequence-set index record points to.

control interval definition field (CIDF)In VSAM, a field located in the 4 bytes at the end of each control interval; it describes the free space, if any, in the control interval. See also record definition field.

control interval update sequence number (CUSN)An indicator used in a data-sharing environment to determine which sharing partner last read a control interval (CI). IMS compares the value of the CUSN for each CI to determine whether a CI should be updated during area restart or recovery.

control key

A key combination, made by pressing the Ctrl key followed by another key on the keyboard, that performs a function or makes a special character.

The keyboard key labeled Ctrl.

control language (CL)The set of all commands with which a user requests system functions.

control language procedure (CL procedure)The single Integrated Language Environment (ILE) procedure that is contained within a CL module. A CL procedure can be called by other ILE procedures when the CL module is bound with other ILE modules to create a program object (*PGM) or service program object (*SRVPGM).

control language program (CL program)A program that is created from source statements consisting entirely of control language commands.

control language source programA set of control language (CL) source statements that can be compiled into either an original program model (OPM) program or an Integrated Language Environment (ILE) module.

control language variable (CL variable)A program variable that is declared in a control language program and is available only to the CL program.

controlled-access areaAn area where access is limited to authorized personnel.

controlled flowA flow that proceeds from one flow object to another through a sequence flow link but is subject to either conditions or dependencies from another flow as defined by a gateway. Typically, a controlled flow is a sequence flow between two activities, with a conditional indicator or a sequence flow that is connected to a gateway.

controlled load serviceIn QoS, a level of service that supports the class of applications that are highly sensitive to overloaded networks. This service emulates a lightly loaded network in congested environments. For example, audio and videoconferencing would work well using controlled load service.

controlled programA RACF function with which an installation can control who can run RACF-controlled programs. See also dirty address space.

controlled repetitive loopIn REXX, a repetitive DO loop in which the repetitive phrase specifies a control variable. The variable is given an initial value before the first run of the instruction list and is then stepped (by adding the result of an optional expression) before the second and subsequent times that the instruction list is run.

The functional component responsible for resource management (load balancing and admission control). The controller communicates with one or more data pumps to initiate and terminate connections to clients.

A device that coordinates and controls the operation of one or more input/output devices (such as workstations) and synchronizes the operation of such devices with the operation of the system as a whole.

controller cardA generic term for any of the I/O controller logic cards, such as storage device controller, work station controller, or communications controller.

controller commandA command that interacts with a web controller directly. On completion, a controller command returns the name of a view task to be executed. The web controller determines the correct implementation class of the view command and then invokes it. See also task command.

controller configurationThe process of creating configuration descriptions for the local (device configuration) and remote (communications configuration) controllers that make up a data processing system.

controller description (CTLD)An object that contains a description of the characteristics of a controller that is either directly attached to the system or attached to a communications line. The system-recognized identifier for the object type is *CTLD.

control-level indicatorIn RPG, an indicator (L1 through L9) used to specify certain fields as control fields and to control the operations that are performed at total and detail time in the RPG program cycle.

controlling application programIn VTAM, an application program with which a secondary logical unit (other than an application program) is automatically put in session whenever the secondary logical unit is available. See also controlling logical unit.

controlling areaA team area that controls access to a configuration of artifacts.

controlling block taskThe outermost block that controls a transaction for a task and all nested tasks, regardless of how the nested tasks are configured.

controlling computerIn printing, the processing unit to which the printer is attached through a channel interface or a communication attachment.

controlling computer systemIn printing, the data-processing system to which a network is connected and with which the system can communicate.

controlling environmentIn architecture, the environment in which an object is embedded, for example, the IPDS and MO:DCA data streams.

controlling itemA chart item whose position on the chart is defined by its date and time, and whose position affects the positions of other timed items. See also free item, ordered item.

controlling logical unitIn VTAM, a logical unit with which a secondary logical unit (other than an application program) is automatically put in session whenever the secondary logical unit is available. A controlling logical unit can be either an application program or a device-type logical unit. See also automatic logon, control logical unit, controlling application program.

controlling processA session leader that has control of a terminal.

controlling subsystemThe interactive subsystem that is automatically started first when the system is started and through which the system operator controls the system.

controlling systemThe system that the controller runs on.

controlling terminalThe active workstation from which the process group for that process was started. Each session may have at most one controlling terminal associated with it, and a controlling terminal is associated with exactly one session.

control linkAn object in a process that links nodes and determines the order in which they run.

control logical unit (CLU)A logical unit that resides in a Transaction Processing Facility (TPF) type 2.1 node and that is used to pass private protocol request units between this TPF type 2.1 node and the logon manager (a VTAM application program). The communication flow between the control logical unit and the logon manager enables a logical unit controlled by VTAM to establish a session with TPF. See also controlling logical unit.

In Internet communications, a message that governs the aspects of a tunnel and sessions within a tunnel.

In Q replication, a message from a Q Apply program or a user application that requests a Q Capture program to activate or deactivate a Q subscription or a publication, invalidate a send queue, or confirm that a target table has been loaded.

control message interface (CMI)A set of control signals that are used to pass hardware-level messages between ports.

control numberAn incrementing number in an EDI envelope.

control objectAny object used to store system information statistics including system performance.

control on serversA setting that prevents Tivoli Workload Scheduler for z/OS from starting more operations at the workstation than there are available servers.

control operationAn action that affects the recording, processing, transmission, or interpretation of data; for example, starting or stopping a process, carriage return, font change, rewind and end of transmission. (I) (A)

control operator

For logical unit (LU) 6.2, a service transaction program that describes and controls the availability of certain resources. For example, it describes network resources accessed by the local LU, and it controls session limits between the LU and its partners. See also contention.

A token that performs a control function such as the symbols ().

control paletteThe area at the top of the application window containing a search field and a set of buttons.

control panelA panel that contains lights and switches that are used to observe status and to operate or service the system.

control point

In computer graphics, a point in real space that controls the shape of a spline curve. The system provides hardware support for wire frame rational cubic splines, and for NURBS surfaces, the specifications of which require four control points.

In APPN, a component of a node that manages resources of that node and optionally provides services to other nodes in the network. Examples are a system services control point (SSCP) in a type 5 node, a physical unit control point (PUCP) in a type 4 node, a network node control point (NNCP) in a type 2.1 (T2.1) network node, and an end node control point (ENCP) in a T2.1 end node. See also physical unit.

control point control block operation code (CPCB operation code)Indicates the type of VTAM process that is represented by the work element.

control point management services (CPMS)A component of a control point, consisting of management services function sets, that provides facilities to assist in performing problem management, performance and accounting management, change management, and configuration management.

control point server (CP-SVR)The pair of conversations that are used to transmit encapsulated SNA.

CONTROL privilegeThe authority to completely control an object, which includes the authority to access, drop, or alter an object and the authority to extend privileges on the object to other users or to revoke their privileges on the object.

control program (CP)A routine, usually part of an operating system, that aids in controlling the operations and managing the resources of a computer system.

control record

A checkpoint record containing data used to initiate, modify, or stop a control operation or determine the manner in which data are processed.

In AFP, a subset of structured fields that can be intermixed with line data records in a print data set.

control regionThe MVS main storage region that contains the IMS control program.

control region adjunctA servant that interfaces with service integration buses to provide messaging services.

control reportA document that contains information that tracks EDI throughout its lifecycle.

control section (CSECT)The part of a program specified by the programmer to be a relocatable unit, all elements of which are to be loaded into adjoining main storage locations.

control sequenceA sequence of bytes that specifies a control function. A control sequence consists of a control sequence introducer and zero or more parameters.

control sequence chainingIn architecture, a method used to identify a sequential string of control sequences so they can be processed efficiently. See also spanning, text control chaining.

control sequence classIn architecture, an assigned coded character that identifies a control sequence's syntax and how that syntax is to be interpreted. An example of a control sequence class is X'D3', which identifies presentation text object control sequences.

control sequence function typeIn architecture, the coded character occupying the fourth byte of an unchained control sequence introducer. This code defines the function whose semantics can be prescribed by succeeding control sequence parameters.

control sequence introducerIn architecture, the information at the beginning of a control sequence. An unchained control sequence introducer consists of a control sequence prefix, a class, a length, and a function type. A chained control sequence introducer consists of a length and a function type.

control sequence lengthIn architecture, the number of bytes used to encode a control sequence excluding the control sequence prefix and class.

control sequence prefixIn architecture, the escape character used to identify a control sequence. The control sequence prefix is the first byte of a control sequence, for example, X'2B'.

In database replication, the database location of the applicable subscription definitions and Apply program control tables.

control specificationIn RPG, a specification that provides information about program generation.

control stateA state that represents the current Network Installation Management (NIM) operation being performed on a machine. This state is one of two machine states.

control statement

A statement placed into an input stream to identify special processing options for jobs

In programming languages, a statement that is used to interrupt the continuous sequential processing of programming statements. Conditional statements such as IF, PAUSE, and STOP are examples of control statements.

In RPG, an entry on a control specification.

control stationThe controlling or primary computer on a multipoint line. The control station controls the sending and receiving of data.

control storage

Printer storage in which data can be entered, held, and retrieved. Control storage contains microcode instructions and other control information; for example, the print buffer.

High-speed memory, containing microcode, that can be implemented as read only or direct access.

Computer storage that contains the programs used to control input and output operations and the use of main storage.

control structureA statement block in the policy that is executed when the terms of the control condition are satisfied.

control subpoolA CICS area that holds the dispatch control area (DCA), interval control elements (ICEs), automatic initiate descriptors (AIDs), queue element areas (QEAs), and other control information. Generally, the control subpool occupies only one page.

control table

In CICS, a storage area used to define or describe the configuration or operation of the system. See also control block.

A pre-defined table used by automatic journals to eliminate acquisitions, intercompany balances and intercompany profit.

control unit (CU)

A device that coordinates and controls the operation of one or more input/output devices, and synchronizes the operation of such devices with the operation of the system as a whole.

In printers, the electronics and code that control the printer and the communication attachment.

control unit addressThe high order bits of the storage control address, which are used to identify the storage control to the host system.

control unit and unit addressA form of addressing for System z devices using device numbers.

control-unit imageIn mainframe computing, a logical subsystem that is accessed through an ESCON or FICON I/O interface. One or more control-unit images exist in each control unit. Each image appears as an independent control unit, but all control-unit images share a common set of hardware facilities.

control-unit initiated reconfiguration

An automation of the process used by service representatives to vary off and vary on subsystem resources for maintenance.

A software mechanism that the ESS uses to request that an operating system of a zSeries or S/390 host verify that one or more subsystem resources can be taken offline for service. The ESS can use this process to automatically vary channel paths offline and online to facilitate bay service or concurrent code installation. Depending on the operating system, support for this process might be model-dependent, might depend on the IBM TotalStorage Enterprise Storage Server Subsystem Device Driver, or might not exist.

control unit terminal mode (CUT mode)An IBM protocol used for communications with an IBM 3174 or 3274 Control Unit or other appropriate interface unit. In this protocol, a program in the workstation emulates a 3278 or 3879 terminal for a user at a virtual terminal, and the interface unit is responsible for enforcing the protocol. See also distributed function terminal.

control vectorOne of a general class of RU substructures that has variable length, is carried within some enclosing structure, and has a one-byte key used as an identifier.

control word

All control fields used to sort or merge a particular group of records. The major field appears first and other fields follow in descending order of importance.

An instruction within a document that identifies its parts or indicates how to format the document.

control word lineAn input line that contains at least one control word.

control word statementIn DCF, a control word and its parameters.

control workstationA single point of control with which the administrator or operator can monitor and manage a system.

convenience functionA function that performs a frequently needed series of tasks automatically to create or manage widgets or other code structures. Convenience functions are included in the AIXwindows Toolkit.

convenience inputThe process of adding a small number of cartridges to an Automated Tape Library Dataserver (ATLDS) without interrupting automated operations. The cartridges are added by inserting them directly into cells in a convenience input station.

converged service processorA common card in both System i and RS/6000 systems. The primary function of a converged service processor is to start the system and diagnose hardware failures.

convergence

In the Distributed Computing Environment (DCE), the degree to which the Cell Directory Service (CDS) attempts to keep all replicas of a directory consistent.

The idea that all platforms are merging into a single presence. The implication of convergence on the software industry is an increased importance on aligning and enforcing consistency across product UIs, devices, and deployments.

In an algorithm, the process of repeated iterations moving closer and closer to an optimal feasible solution, as opposed to sometimes moving closer and sometimes moving further away.

convergence levelThe level at which two or more alternate drill-down paths meet.

conversation

A dialog between a terminal and a message processing program using IMS conversational processing facilities. Also, a dialog between an LU 6.2 program and an IMS application program. A conversation between a terminal and a message processing program is significant status that is kept in RM, if RM is used. Status for a held conversation is not kept in RM. The IMS conversation is represented by a CCB. See also conversational processing.

Pertaining to a program or a system that conducts a dialog with a terminal user, alternately receiving and transmitting data.

Pertaining to an SNA conversation or a dialog between two programs.

Conversational Monitor System (CMS)A virtual-machine operating system that provides general interactive time sharing, problem solving, and program development capabilities.

conversational processingAn optional IMS facility with which an application program can accumulate information acquired through multiple interchanges with a terminal, even if the program stops between interchanges. See also conversation, IMS conversation.

conversational stateThe field values of a session bean plus the transitive closure of the objects reachable from the bean's fields. The transitive closure of a bean is defined in terms of the serialization protocol for the Java programming language, that is, the fields that would be stored by serializing the bean instance. (Sun)

conversational transactionIn APPC, two or more programs communicating using the services of logical units (LUs).

conversation characteristicIn distributed transaction processing, one of the attributes of a conversation that determine the functions and capabilities of programs within the conversation.

conversation control block (CCB)An IMS control block that represents a conversation between a terminal and an application program.

conversation correlatorIn LU6.2 distributed transaction processing, a field passed in the attach header when the conversation is initiated.

conversation data block (CDB)An area used by a program to obtain information about the outcome of a DTP command on an APPC basic (GDS) conversation.

conversation group IDAn identifier that represents a specific session between two specific LUs.

conversation securityIn APPC, a process that allows validation of a user identifier or group identifier and password before establishing a connection.

conversation stateThe condition of a conversation, such as send or receive state. The conversation state reflects the actions that have been taken pertinent to that conversation and determines what the next set of actions may be.

conversion

In programming languages, the transformation between values that represent the same data item but belong to different data types. Information may be lost because of conversion since accuracy of data representation varies among different data types.

In DFSMSrmm, the process of moving removable-media-library inventory from another media management system to DFSMSrmm. DFSMSrmm manages the inventory and policies after conversion.

The process of changing from one form of representation to another. Changing a code point that is assigned to a character in one code page to its corresponding code point in another code page is an example of conversion.

The process of replacing a code point that is assigned to a character in one code with its corresponding code point assigned in another code.

conversion codeIn a print function call, a specification of the type of the value, as the value is to be printed (in octal format, for example).

conversion eventA non-monetary action that a visitor can accomplish such as downloads, registrations, sign-ups, and store locator views. A conversion event is a non-commerce business objective.

conversion functionA C++ member function that specifies a conversion from its class type to another type.

conversion mappingAn entry in a mapping table which allows you to map identifiers to accounts or other identifiers.

conversion methodAn algorithm used during conversion. It includes the necessary logic to separate the input code point string into appropriate substrings, converting the substrings and assembling the resultant substrings, for a particular set of criteria to be used during conversion. A conversion method may use associated conversion tables as resources during the conversion.

conversion mode (CM, CM*)The first stage of the version-to-version migration process. In a DB2 data sharing group, members in conversion mode can coexist with members that are still at the prior version level. Fallback to the prior version is also supported. When in conversion mode, the DB2 subsystem cannot use most new functions of the new version. See also conversion mode*, enabling-new-function mode, enabling-new-function mode*, new function mode.

conversion mode* (CM*)A stage of the version-to-version migration process that applies to a DB2 subsystem or data sharing group that was in enabling-new-function mode (ENFM), enabling-new-function mode* (ENFM*), or new-function mode (NFM) at one time. Fallback to a prior version is not supported. When in conversion mode*, a DB2 data sharing group cannot coexist with members that are still at the prior version level. See also conversion mode, enabling-new-function mode, enabling-new-function mode*, new function mode.

conversion rateThe rate at which customers respond to cues provided by a website towards a specific desired action.

conversion specificationIn a print function call, a specification of how the system is to place the value of zero or more format parameters in the output stream. Each conversion specification contains a % (percent) symbol that is followed by conversion modifiers and a conversion code.

conversion table

A resource used with a conversion method to perform conversion. Typically, a conversion table contains a set of input code point values corresponding to a given set of output code point values. Its structure and contents are designed to suit the conversion algorithm with which it is to be used.

A table that contains a set of characters that can be replaced with alternative characters.

An object that contains a set of hexadecimal characters used to convert one or more characters of data. The table can be used for the conversion of data being moved between the system and a device. For example, data stored in one coded character set may need to be displayed or entered on display devices that support a different coded character set. The table can also be used to specify an alternative collating sequence or field conversion functions. The system-recognized identifier for the object type is *TBL.

conversion template tableA CICS table containing entries that identify how data is to be converted when transported to or from a remote system.

converted commandAn intermediate form of a character-coded command that is produced by VTAM through use of an unformatted system services definition table. The format of a converted command is fixed; the unformatted system services definition table must be constructed in such a manner that the character-coded command (as entered by a logical unit) is converted into the predefined, converted command format. See also unformatted.

converted journal entryThe version of a journal entry that can be displayed, printed, or written to a database output file.

converter

In Enterprise JavaBeans (EJB) programming, a class that translates a database representation to an object type and back.

A device that converts data from one form to another without altering the underlying information.

converter/interpreter processingThe system function that converts and interprets job control language (JCL) for z/OS.

cookie poisoningA technique used for conducting identity theft or session hijacking. By manipulating the information stored in a browser cookie, hackers assume the user’s identity and have access to that user’s information for malicious purposes.

cooperative applicationIn the Systems Application Architecture (SAA) environment, a type of distributed application in which the user interface portion of the application runs on a programmable work station while some or all of the remaining code runs on one or more linked systems.

CoOperative Development Environment/400A feature of the WebSphere Development Studio Client licensed program that provides System i application development and maintenance tools for editing, compiling, and debugging third-generation programming languages.

cooperative processingDistributed processing in which processors, typically a programmable workstation and a host computer, accomplish the work of an application by means of coordinated or synchronized use of processing functions and system resources.

coordinate

A member of an ordered set of N numbers that identifies a position in N-dimensional space. For example, in a two-dimensional map of the Earth, a position can be referenced by two coordinates. The first coordinate identifies the latitude value of the position, and the second coordinate identifies the longitude value of the position.

In architecture, one of a pair of values that specify a position in a coordinate space.

To bring into a common action, movement, or condition.

coordinated data martA data mart that shares its dimensions with many other data marts.

In Advanced Function Presentation (AFP), a Cartesian coordinate system. An example is the image coordinate system that uses the fourth quadrant with positive values for the Y-axis. The origin is the upper-left corner of the fourth quadrant. A pair of (x,y) values corresponds to one image point. Each image point is described by an image data element.

A reference framework that is used to define the positions of points in space in two or three dimensions.

A given convention for locating pixels on a given display or window, where, in AIXwindows, X is the horizontal axis and Y is the vertical axis. The origin is [0,0] at the upper-left or lower-left corner, depending on the convention in use. For a window, the origin is at the upper left or lower left (depending on the convention in use), inside the border. Coordinates are discrete and specified in pixels. Each window and pixmap has its own coordinate system.

coordinating agentThe agent that is directly responsible for processing requests from and responding to an application. If the connection concentrator is not used, the agent remains associated with the application during the life of the application and initiates subagents that work for the application. See also subagent.

coordinating serverIn a query that spans multiple database servers, the server in which the query is initiated. To respond to the query, the coordinating server starts sessions on the other servers involved in the query. See also distributed query, remote table, subordinate server.

coordinator

In a multi-MVS configuration, a region that receives requests from master regions to initiate a takeover. It then instructs all the alternate regions to take over. See also master, subordinate.

A user role that is responsible for managing one or more criteria of the scorecard and assigning corresponding evaluators to the scorecard.

The system component that coordinates the commit or rollback of a unit of work that includes work that is done on one or more other systems.

coordinator agentThe agent responsible for accepting and processing application requests on a database connection or an instance attachment.

coordinator controller (CCTL)A z/OS subsystem that consists of the database resource adapter (DRA) and a transaction management subsystem, such as CICS.

coordinator control subsystem (CCTL)In IMS, the transaction management subsystem that communicates with the DRA, which in turn communicates with DBCTL. In a CICS-DBCTL environment, the CCTL is CICS. The term is used in a number of IMS operator commands that apply to DBCTL, and in the IMS manuals.

coordinator partitionThe database partition server to which the application originally connected and on which the coordinating agent is located.

coordinator subsectionThe subsection of an application that starts other subsections (if any) and returns results to the application.

coordinator systemIn a RACF data sharing group, the system on which the system operator or administrator enters a RACF command that is propagated throughout the group. See also peer system.

co-ownerThe secondary owner of an opportunity.

coprocessor

A supplementary processor that performs operations in conjunction with another processor.

In personal computers, a microprocessor on an expansion board that extends the address range of the processor in the system unit or adds specialized instructions to handle a particular category of operations.

copy

A product of a document copying process.

To read data from a source, leaving the source data unchanged, and to write the same data elsewhere.

copy backupA full backup in which the transaction log files are not deleted so that backup procedures that use incremental or differential backups are not disrupted.

copybook

In Enterprise Service Tools, a COBOL header file that describes all the columns in an underlying data file.

A piece of source code that is designed to be copied into many source programs.

copy constructorA C++ constructor used to make a copy of a class object from another class object of the same class type.

copy controlThose functions that determine the number of copies to be printed for each sheet of paper and print job, and which copies will have copy modification.

copy counterIn architecture, bytes in an Acknowledge Reply that identify the number of copies of a page that have passed a particular point in the logical paper path.

copy group

An internal object in a form definition or a print data set that controls such items as modifications to a form, page placement, and overlays.

One or more copies of a sheet of paper or form. Each copy can have modifications, such as text suppression, page position, forms flash, overlays, paper-source, and duplex printing.

A policy object containing attributes that control how backup versions or archive copies are generated, where backup versions or archive copies are initially located, and when backup versions or archive copies expire. A copy group belongs to a management class. See also archive copy group, backup copy group, backup version, management class.

copy helperAn access bean that contains a local copy of attributes from a remote entity bean. Unlike bean wrappers, copy helpers are optimized for use with a single instance of an entity bean.

copy modificationThe process of adding, deleting, or replacing data on selected copies of either a presentation space or certain pages of a print job.

copy modification segmentIn the IBM 3800 Printing Subsystem, the portion of copy change that has the six control bytes and a maximum of 204 text bytes. When transferred to a printer, these bytes alter specific copies of a data set.

copy-on-writeAn option that creates a mapped file with changes that are saved in the system paging space, instead of saving the changes to the copy of the file on the disk.

copy poolA collection of names of storage groups that are processed collectively for fast replication operations.

copy proposed to planIn Rational Portfolio Manager, the act of moving a project from a planning stage into a scheduled, executable state.

copy separationThe method or printer mechanism for distinguishing consecutive copies of a single data set or print file. In the continuous-forms stacker, the method consists of the alternation between one, two, or three vertical bars placed on the left carrier strip between forms. In the burster-trimmer-stacker or for cut-sheet paper, the mechanism consists of offset stacking.

copy serviceA data management service that extracts data described in a source data access model and inserts it into a destination data access model.

Copy Services clientSoftware that runs on each ESS cluster (or, optionally, in an external cluster) in the Copy Services server group and that performs the following functions: communicates configuration, status, and connectivity information to the Copy Services server; and performs data-copy functions on behalf of the Copy Services server. See also backup Copy Services server, primary Copy Services server.

Copy Services command-line interface (Copy Services CLI)Software that invokes ESS Copy Services functions from the command-line interface (CLI) of hosts that are attached to the ESS. See also command-line interface.

copy setThe set of source volumes or target volumes involved in a FlashCopy operation.

copy storage poolA named set of volumes that contain copies of files that reside in primary storage pools. Copy storage pools are used only to back up the data that is stored in primary storage pools. A copy storage pool cannot be a destination for a backup copy group, an archive copy group, or a management class (for space-managed files). See also destination, primary storage pool, server storage, storage pool, storage pool volume.

copy subgroupIn architecture, a part of a copy group that specifies a number of identical copies of a sheet and all modifications to those copies. Modifications include the media source, medium overlays to be presented on the sheet, text suppressions, the number of pages on the sheet, and either simplex or duplex presentation.

copy tableA table used to copy period values from one account to another in the same period and for the same company.

copy targetA named set of SMS storage groups that are to be used as containers for copy pool volume copies. A copy target is an SMS construct that lets you define which storage groups are to be used as containers for volumes that are copied by using FlashCopy functions.

copy versionA point-in-time FlashCopy copy that is managed by hierarchical storage management (HSM.) Each copy pool has a version parameter that specifies the number of copy versions to be maintained on disk.

coreA single chip that houses a central processing unit (CPU) and is a component in the larger circuit design of a computer. A single chip can only contain one CPU, but a processor can contain multiple cores. See also dual-core, multi-core, processor value unit.

CoreIn AIXwindows, the top-level superclass from which all widgets and gadgets are derived. Core consists of three subclasses (Object, RectObject, and WindowObj) that collectively provide the appearance resources and behavioral resources required by all widgets and gadgets in the AIXwindows toolkit.

core attributeA data attribute that is associated with a given item in the Global Registry.

core attribute collectionA system-defined attribute collection that groups all mandatory, primary key, or path attributes for a given specification. Core attribute collections are used in the user interface to give users access to the required fields when no view has been defined. See also attribute, attribute collection, view.

core dumpA process by which the current state of a program is preserved in a file. Core dumps are usually associated with programs that have encountered an unexpected, system-detected fault, such as a segmentation fault or a severe user error. A programmer can use the core dump to diagnose and correct the problem. See also core file.

core fileA file that preserves the state of a program, usually just before a program is terminated because of an unexpected error. See also core dump.

core groupA group of processes that is directly accessible to each other and is connected using a local area network (LAN).

core group access pointA definition of a set of servers that provides access to the core group.

core partitionA Netezza disk partition that is used for storing information about how disk space is being used. Disk information includes directories, catalogs, dictionaries, and coarse indices.

corequisiteA component, resource, or service that is needed in parallel with a component. In other words, the components, resources, or services listed as corequisites of a component must be installed and configured in conjunction with the component. See also requisite.

corequisite fixA temporary solution to or a bypass of a problem that is necessary to provide a complete solution to correct a problem. The system requires that you apply the corequisite fix with the PTF that needs it. See also distribution requisite fix, prerequisite fix.

core resourceA resource that is provided by the console and is required for basic operation. See also resource type.

coronaIn printers, a small diameter wire (or wires, depending on the function) to which a high voltage is applied, causing ionization of the air. The ionization creates an electrical charge to perform various functions during the printing process.

corporate hierarchyA Domino directory feature that is used to assign users to custom, hierarchical categories in the directory.

corporate producerAn external corporation that is contracted to sell a carrier’s products.

corpusThe set of source documents that have been ingested into a IBM Watson system. This content can come from a variety of unstructured sources, such as wiki pages, industry journals, websites, forums, and more. These ingested resources are used to understand the question, determine hypotheses, find supporting evidence, and rank candidate answers. The term content is sometimes used to distinguish the source corpora from the terms data or training data, which describe assets that are used to train and test the system.

corrective actionThe steps that are taken to resolve a discrepancy and return an asset to service

corrective maintenanceMaintenance that is performed after equipment has failed, been degraded, or underperformed.

corrective service disketteA diskette provided by IBM to registered service coordinators for resolving user-identified problems with previously installed software. This diskette includes program updates designed to resolve problems.

correlated columnIn SQL, a relationship between the value of one column and the value of another column.

correlated referenceA reference to a column of a table or view that is outside a subquery. See also correlated subquery.

A statistical measure of the association between two numeric fields. Values range from -1 to +1. A correlation of 0 means that there is no relationship between the two fields.

The relationship, captured in a correlation expression, that describes how an incoming event is matched with one or more monitoring context instances to which it will be delivered.

In transaction monitoring, the process of tracking hierarchical relationships among transactions and associating transactions with their nested subtransactions.

Data that enables a user to record document-specific correlation parameters generated during translation, by the correlation service, or by document tracking functions.

A mechanism that bridges a point in a process flow between two or more process instances.

A record used with business processes and state machines to allow two partners to initialize a transaction, temporarily suspend an activity, and then recognize each other again when that activity resumes.

A 2-byte value that specifies an identifier of an Intelligent Printer Data Stream (IPDS) command. The correlation ID is optional and is present only if bit one of the command's flag byte is 1.

A field in a message that provides a means of identifying related messages. Correlation identifiers are used, for example, to match request messages with their corresponding reply message.

An application-defined identifier assigned to distributions for the user's information.

In DB2 for z/OS, an identifier that is associated with a specific thread. In TSO, the correlation ID is either an authorization identifier or the job name.

correlation nameAn identifier that is specified and used within a single SQL statement as the exposed name for objects such as a table, view, table function reference, nested table expression, or data change table reference. Correlation names are useful in an SQL statement to allow two distinct references to the same base table and to allow an alternative name to be used to represent an object.

correlation numberA secondary key that is used with sequencing or to signify child records for a specific parent.

correlation propertyData in an event that the runtime server uses to determine which instance of a task, process, or business state machine should receive the input at run time.

correlation tableIn OSI X.400, a table that records details of distributions sent and received across a gateway (such as VM/MVS bridge or X.400). A correlation table is used by a gateway to forward acknowledgments, as appropriate, after they are received.

correlator

In Sterling Control Center, a feature that associates multiple milestones within a workflow.

A value passed between two or more programs that allows correlation or identification of mutual resources.

Information that identifies a relation among things. An example is a variable field of a response that identifies the corresponding request.

correspondentAn institution to which your institution sends and from which it receives messages.

corrupted indexAn index that does not correspond exactly to the data in its table.

coshoppingA starter store enhancement that enables two shoppers to explore a store, view products, and chat about products. Coshopping provides real-time synchronization of the web browsers of two users to create a single collaborative shopping session controlled by a single user.

The estimated total resource usage that is necessary to run the access plan for a statement (or the elements of a statement). Cost is derived from a combination of processor cost (in number of instructions) and I/O cost (in numbers of seeks and page transfers).

The sum of the labor and non-labor capital outlay that is required to perform a project.

A number that is used as a weighting mechanism to differentiate one resource from another where a smaller value is always preferred.

cost allocationThe proportionate allocation of the invoice amount to various departments based on the cost allocation method defined in the application.

cost categoryA category into which DB2 for z/OS places cost estimates for SQL statements at the time the statement is bound. The cost category is externalized in the COST_CATEGORY column of the DSN_STATEMNT_TABLE when a statement is explained.

cost centerAn organizational element that contributes to the cost of a project.

cost codeA code that is associated with every dollar amount, such as budget, commitments, and forecast. Cost codes are hierarchical in nature.

cost factorA parameter used to calculate the cost of inventory. Cost factors represent value modifiers that are an additional function or component from a base cost to give a new unit cost. Examples of cost factors include insurance, freight, material handling, and packaging.

cost functionA function in the simplex algorithm that associates a price or cost with a variable as variables move into or out of the basis. See also pseudocost.

cost objectA business entity such as a project, department, or service linked to orders to track expenditures of the department or organization.

cost performance index (CPI)The ratio of cost efficiency or value earned per unit actual cost. A number less than one indicates that the project is spending more money than budgeted.

cost savingThe amount saved by executing the audit rule on an invoice. The amount saved is the difference between the actual invoice amount and the billed invoice amount.

cost variance (CV)The difference between the estimated cost of an activity and the actual cost of that activity.

coterminationThe process of combining the lines of two or more existing contracts that are about to expire into a single renewal quote contract, calculated on a prorated basis, or according to customization.

cotermination quote contractThe single renewal quote contract that results from a cotermination. It has relationships to all related contracts including an original contract.

count

An aggregate function which returns the number of rows of a query or some part of a query.

A measure that indicates the number of transactions that comprise a spend.

An inventory control activity done to physically count and compare the physical quantity of an item in a warehouse location to the system quantity.

The number of cases that satisfy the row and column conditions for each cell. If the table is weighted, the counts are also weighted.

counter

A specialized metric used to keep track of the number of occurrences or the duration of a specific situation or event. For example, you can use a counter to track the number of times that a task is started within a process, where that task is contained in a loop.

A representation of information that is cumulative up until the sample is taken. The counter counts values that increase, such as the number of deadlocks. Counters are reset when an instance or a database is stopped and restarted. See also gauge.

In the X.25 API, a variable that is increased by one when a packet arrives and is decreased by one when a packet is received; it can be used to notify the application program of incoming packets.

A data item used for storing numbers or number representations in a manner that permits these numbers to be increased or decreased by the value of another number or to be set to an arbitrary value.

A binary string that is used by some block cipher modes in an exclusive-OR (XOR) operation. It is incremented and then applied in the encryption or decryption of each block of data. For a given key, a counter should never be repeated.

A register or storage location used to accumulate the number of occurrences of an event.

counter identifierIn the X.25 API, the name of a counter.

counterpart SANA non-redundant portion of a redundant storage area network (SAN). A counterpart SAN provides all the connectivity of the redundant SAN but without the redundancy. Each counterpart SAN provides an alternate path for each SAN-attached device. See also redundant SAN.

counter valueA displayed monetary amount converted from the shopping currency into a different currency.

count fieldThe first field of a count-key-data (CKD) record. This field contains eight bytes: the first four bytes identify the track address, which includes the cylinder and head that are associated with the track; the fifth byte identifies the record on the track; the sixth byte identifies the length of the record's key field; the last two bytes identify the length of the record's data field.

count key data

An ESA/390 architecture for a direct access storage device (DASD) logical device that specifies the format of and access mechanisms for the logical data units on the device. The logical data unit is a track that can contain one or more records, each consisting of a count field, an optional key field, and an optional data field. See also custom volume.

An architecture for a direct access storage device (DASD) device or logical device that specifies the access mechanisms for the logical data units on the device through a specific set of supported channel commands. Extensions to the CKD command set form the basis of Extended CKD.

A data recording format that uses self-defining record formats in which each record on a volume is represented by up to three fields: a count field identifying the record and specifying its format, an optional key field that can be used to identify the data area contents, and an optional data field that typically contains the user data. See also data record, storage architecture type.

count-key-data device (CKD)A disk storage device for storing data in the format: count field normally followed by a key field followed by the actual data of a record. The count field contains, in addition to other information, the address of the record in the format: CCHHR (where CC is the two-digit cylinder number, HH is the two-digit head number, and R is the record number) and the length of the data. The key field contains the record's key (search argument).

count loginAn administration module that shows how many users are logged in to a COPLINK node.

count monitorAn occurrence-based monitor that tracks specific occurrences. The monitor runs its action when the number of occurrences exceeds a threshold.

count requestA request for a count of inventory.

country code

From the ISO standard, a 2-character abbreviation for a country, for example "CN" for China and "BE" for Belgium. Country codes and language codes together form the basis for local names. See also language code.

In X.25 communications, the 3-digit number that precedes the national terminal number in the network user address for public networks.

country extended code page (CECP)A single-byte EBCDIC code page in the IBM corporate registry that contains the 190 characters found in character set 00697. While each CECP contains the same set of characters (allowing for conversion of data without loss), the code point allocation of the characters is not identical. For example, all CECPs contain the character backwards slash, however in code page 500 it is located at code point x'E0' and in code page 280 it is located at code point x'48'.

count sheetA data entry form used in batched counting tasks. A count sheet is used to enter the counts and later reconciled on the system.

count zoneA specific area set up to help manage cycle counting activities. Generally, cycle counters are assigned all of the counting responsibilities of a zone.

couple data set (CDS)A data set that contains information related to a sysplex, its systems, cross-system coupling facility (XCF) groups, and their members. See also sysplex couple data set.

coupled extended remote copy (CXRC)In z/OS or S/390 environments, a technique that supports synchronous copy operations in large environments that have an expanded number of primary-storage controls and direct access storage device (DASD) volumes; this number is in excess of those supported by a single data-mover configuration. Installations can have configurations consisting of thousands of volumes in multiple extended remote copy (XRC) sessions; coordination among the sessions ensures that all volumes will be recovered to a consistent time. CXRC greatly expands upon the ability of XRC to provide remote disaster-recovery protection across a sysplex.

couplerA device that connects a modem to a telephone network.

coupling

Two volumes that are paired for a remote mirroring purpose.

A process that adds an already existing EDI to another node within the network.

coupling facility resource management (CFRM)A component of z/OS that provides the services to manage coupling facility resources in a Parallel Sysplex. This management includes the enforcement of CFRM policies to ensure that the coupling facility and structure requirements are satisfied.

coupling serviceA function of the cross-system coupling facility (XCF) that transfers data and status information among the members of a group that reside in one or more of the MVS systems in a sysplex.

couponA ticket or document that can be exchanged for a financial discount on a product.

courier serverIn the DCE Distributed Time Service, a local server that requests a time value from a randomly selected global server. The time value returned is used to synchronize a local access network (LAN) with all other parts of the network.

course developerAn organization or individual who creates information, educational, or entertainment content for the Internet, CD-ROMs, or other software-based products.

court codeAn identification number that is assigned to a court of jurisdiction.

court docket detailsAn agenda for a court.

coverage

The range of a received radio signal and its boundary. The coverage area of a cellular device is limited by the range of the radio network relative to its base station. The coverage area of a satellite phone is the entire earth because the radio signal is transmitted by satellites. See also base station.

The network area covered by the service provider.

covered databaseA database or area in an RSR environment that is tracked by a tracking subsystem. Recovery information is not maintained by the tracking subsystem for databases or areas that are not covered.

cover sheetA page on which the user can view and edit the summary and custom properties of a chart.

Cox regression algorithmAn algorithm that produces a survival function that predicts the probability that the event of interest has occurred at a given time for given values of the predictor variables.

CP capabilitiesThe level of network services provided by the control point (CP) in an APPN end node or network node. CP capabilities information is exchanged during the activation of CP-CP sessions between two nodes. A node's CP capabilities are encoded in the CP capabilities (X'12C1') GDS variable.

CP-CP sessionIn SNA, one of the parallel sessions between two control points, using LU 6.2 protocols and a mode name of CPSVCMG, on which network services requests and replies are exchanged. Each CP of a given pair has one contention-winner session and one contention-loser session with the other.

CP-CP session-capable connectionA link over which a node permits CP-CP sessions to be established.

CP-SVR pipeA pair of LU 6.2 sessions, between the control points in dependent-LU-requester (DLUR) and dependent-LU-server (DLUS) nodes, that carry the flows of SSCP services, which are encapsulated in APPN formats.

CPU entitlementThe percentage of CPU resources on a host or LPAR that the WLM dispatcher considers a service class to be entitled to use based on its CPU shares attributes.

CPU limitThe maximum percentage of CPU resources that can be consumed by work executing in a specified service class, regardless of relinquished CPU resources becoming available. This percentage is allocated to each LPAR or physical host where the DB2 database manager is running.

CPU time

The amount of time a program is running in the CPU or is being serviced by the operating system. Does not include time associated with the program's I/O or time in which other processes preempt the program's use of the CPU.

crawlTo search for information across various web pages on the Internet or on an intranet. See also crawler.

crawlerA software program that retrieves documents from data sources and gathers information that can be used to create search indexes. See also crawl.

crawl spaceA set of sources that match specified patterns, such as database names, file system paths, domain names, IP addresses, and Uniform Resource Locators (URLs), that a crawler reads from to retrieve items for indexing.

created temporary tableA table whose definition is persistent and shared between sessions but whose data is deleted when the session in which the table was instantiated ends. The data in the table is available only within the session in which the table was instantiated. The table is defined by using the SQL statement CREATE GLOBAL TEMPORARY TABLE. See also base table, declared temporary table, temporary table.

create link pack area (CLPA)An option that is used during initial program load to initialize the link pack pageable area.

create methodIn enterprise beans, a method defined in the home interface and invoked by a client to create an enterprise bean. (Sun)

creation dateThe system date when an object is created.

creation factoryA URI that is used to create new resources by using HTTP POST.

creation timeThe total time that an asset owner takes to create an asset, measured in hours, days, months, or years.

creation time stamp (CTS)In the Distributed Computing Environment (DCE), an attribute of all Cell Directory Service clearinghouses, directories, soft links, child pointers, and object entries that contains a unique value reflecting the date and time the name was created.

In the Java Authentication and Authorization Service (JAAS) framework, a subject class that owns security-related attributes. These attributes can contain information used to authenticate the subject to new services.

A set of information that grants a user or process certain access rights.

Information acquired during authentication that describes a user, group associations, or other security-related identity attributes, and that is used to perform services such as authorization, auditing, or delegation. For example, a user ID and password are credentials that allow access to network and system resources. See also shared access.

A declaration of authorization or other security attributes of a subject that is typically validated and signed by a trusted third party. See also authentication, principal.

A course, certificate, or regulatory license that is required by either the insurance carrier or a government regulator to sell an insurance product.

credential mapperThe component of Web Express Logon that handles requests for host credentials, which have been previously authenticated by a network security layer. See also network security layer.

credential poolA group of credentials with similar access privileges. The pool can be defined as a service group or a set of service groups.

credential predictionA method of hijacking or impersonating a website user by guessing the unique value that identifies a particular session or user.

credential tokenA discrete data object, created from a credential, that can be used to gain access rights.

credibilityA numeric rating between 0-10 that is used to determine the integrity of an event or an offense. Credibility increases as multiple sources report the same event or offense.

creditIn Fibre Channel technology, the number of receive buffers allocated to a transmitting node port (N_port), node loop port (NL_port), or fabric port (F_port). The credit is the maximum number of outstanding frames that can be transmitted by that N_port, NL_port, or F_port without causing a buffer overrun condition at the receiver.

credit cardA method of payment for goods or services where the buyer pays a lender incremental payments until the debt is paid in full.

One or more workers with the appropriate skills and tools to perform the work required to resolve work order.

A collection of resources that work together to perform a specific type of work. For example, an OHLINE crew might consist of 3 people and a bucket truck (a tool) that work together to build or repair overhead electrical power lines.

crew typeA template that identifies the crafts, qualifications, and tools that are required to perform the work.

crime typeA uniform crime reporting code established by the FBI that is assigned to a case.

criterion

A statement or a question against which an evaluator analyzes the strategic importance of a supplier.

A standard on which a judgment or decision may be based.

critical answerAn answer consequence type for a question that is marked as crucial and that requires a mandatory "Yes".

critical design review (CDR)A review performed by the System Engineer (SE) during Develop Phase.

critical infrastructureAny structure, building, or area that is deemed critical to the government or to the general population. Examples of critical infrastructure are gas pipelines, medical facilities, and military bases.

criticalityA rating, assigned by the user, which represents the potential vulnerability of an asset to a malicious exploit. The criticality rating contributes to the overall risk score of an asset.

critical path

A series of activities that determines the earliest completion of a project; the critical path changes as activities or tasks are completed ahead or behind the original schedule estimates.

The processing path that takes the longest time to complete of all parallel paths in a process instance, where each path considered begins at a start node or an input to the process and ends at a terminate node.

critical path methodA technique that is used to identify and predict project duration by analyzing which sequence of activities has the least amount of scheduling flexibility.

critical ratioA relationship of the time scheduled to complete a task to the time available to perform it. Critical ratios are used to measure how closely a task is adhering to its schedule.

critical resourceThe system resource whose speed and/or size limits the speed with which a particular workload can be processed.

critical resultThe result that is derived when an assessment value is outside the defined tolerance threshold. It is indicative of a serious risk.

critical sectionA portion of shared data to which simultaneous access by multiple threads or applications must be prevented.

cross-cell environmentA production environment in which one or more servers in one cell can receive events from another server or set of servers in another cell.

cross-certificateA certificate in the Notes Personal Address Book or Domino Directory that indicates trust in an Internet certificate or trust in a certificate from a foreign Domino domain.

cross-compilerA compiler that produces executable files that run on a platform other than the one on which the compiler is installed.

cross-cutting concernA software concern (synchronization, logging, memory allocation, and so forth) that is external and orthogonal to the problem that a software component is designed to address.

cross-dimensional formulaA formula that references members from more than one dimension.

cross-dock facilityA stopping point during the delivery. When orders are unloaded and loaded at a cross-dock facility, the freight is not taken into the inventory. The shipper manages all legs of the shipment. See also pool point.

cross-dockingEliminating the storage process by moving items directly from the receiving dock to the shipping dock or forward pick areas.

cross-domainPertaining to control or resources involving more than one domain. See also same-domain.

cross-domain analysisA data analysis that identifies the overlap of data values between two columns of data.

cross-domain key

In SNA, a pair of cryptographic keys that are used by a system services control point (SSCP) during the initiation of cross-domain LU-LU sessions that use session-level cryptography. The keys are used to encipher the session cryptography key that is sent to another SSCP and to decipher the session cryptography key that is received from the other SSCP.

In Cryptographic Support, a type of key-encrypting key used to encrypt a data-encrypting key that is being sent across a data line or being stored in a file.

cross-domain key tableIn Cryptographic Support, a table in the system-supplied physical file QACRKTBL in library QUSRSYS used to store all key-encrypting keys other than the host master key and its variants. Each record of the file contains the name of the key, its use, and its value. The three types of uses are sending, receiving, and personal identification numbers (PINs).

cross-organizational transformationA program or project that benefits from input provided by other involved business units and which provides return information back to them. The components of the program/project may be developed and managed by one or more organizations.

crossoverThe change from the barrier algorithm to the primal or dual simplex algorithm.

crossover domainA domain that returns a value from a field in one application to a field in another application.

crossover fieldAn application field that links to other fields, allowing a user to link data between certain applications.

cross-project traceabilityA feature that establishes traceability relationships between requirements that reside in different projects. See also external project, external traceability.

cross-referenceA pointer to a preferred term (see reference) or to additional information (see also reference).

cross-reference listingThe part of the compiler listing that tells where files, fields, and indicators are defined, referred to, and changed in a program.

cross-reference organizationThe organization responsible for defining or maintaining items in multiple catalogs that are supported (referenced) through a single mechanism, such as a Global Trade Item Number (GTIN).

cross-reference tableA table that is created in Partner Editor and is used to convert the user's values to a trading partner's values during outbound processing, or a partner's values to the user's values during inbound processing.

cross-sellA product recommendation that is related or complementary to the currently displayed or selected product. See also accessory, up-sell.

cross-sell associationAn association category to an item, so that all the items in a category are associated to the item as cross-sell items.

cross-sellingEncouraging customers to buy products from other departments or categories, beyond the initial offering.

cross-server migrationThe process of migrating an existing product installation to a new version by installing the product on a new server, transferring data to the new installation, and converting the data to the new version.

cross-site mirroring (XSM)A function of i5/OS High Available Switchable Resources, Option 41, that provides geographic mirroring and the services to switch over or automatically cause a failover to a secondary copy, potentially at another location, in the event of an outage at the primary location.

cross-site scripting (XSS)An attack technique that forces a website to echo client-supplied data, which execute in a user’s web browser.

cross sold productA product that was purchased with one or more other products in a single order.

cross streetAn intersecting street at a described location that is used as a location reference point.

cross-system coupling facility (XCF)A component of z/OS that provides functions to support cooperation between authorized programs running within a sysplex.

cross-system extended services (XES)A set of z/OS services with which multiple instances of an application or subsystem, running on different systems in a sysplex environment, can implement high-performance, high-availability data sharing by using a coupling facility.

cross-system restartA process during which automatic restart management restarts elements on another eligible system in the sysplex when a system fails.

cross tabulation (crosstab)A statistical technique used to display the relationships between two or more variables in a table.

cross-validationA technique for testing how well a model generalizes in the absence of a holdout test sample. Cross-validation divides the training data into a number of subsets, and then builds the same number of models, with each subset held out in turn. Each of those models is tested on the holdout sample, and the average accuracy of the models on those holdout samples is used to estimate the accuracy of the model when applied to new data. See also overfitting.

cryptographicPertaining to transformation of data to conceal meaning. See also decipher, encipher.

cryptographic adapterAn expansion board that provides a comprehensive set of cryptographic functions for the network security processor and the workstation in the TSS family of products.

cryptographic algorithmA set of rules that specify the mathematical steps required to encrypt and decrypt data.

cryptographic application programming interface (CAPI)An application programming interface that provides services to enable developers to secure applications using cryptography. It is a set of dynamically-linked libraries that provides an abstraction layer which isolates programmers from the code used to encrypt the data.

Cryptographic CoprocessorIn iSeries, a hardware module that can be added to a system to provide enhanced cryptographic processing capabilities.

cryptographic keyA parameter that determines a cryptographic transformation between plaintext and ciphertext.

Cryptographic Service Provider (CSP)A feature of the i5/OS operating system that provides APIs. The CCA Cryptographic Service Provider enables a user to run functions on the 4758 Coprocessor.

Cryptographic SupportThe IBM licensed program that provides support for the encryption and decryption of data, according to the Data Encryption Algorithm, and for the management of cryptographic keys and personal identification numbers (PINs).

The transformation of data to conceal its information content and to prevent its unauthorized use or undetected modification.

A method for protecting information by transforming it (encrypting it) into an unreadable format, called ciphertext. Only users who possess a secret key can decipher (or decrypt) the message into plaintext.

cryptography verification requestA request unit that is sent by the primary logical unit (PLU) to the secondary logical unit (SLU) as part of cryptographic session establishment. The request unit allows the SLU to verify that the PLU is using the correct session cryptography key and initialization vector (IV).

CSM databaseA repository of cluster, node, and node group information that is created and used by Cluster Systems Management (CSM).

CSM-only installationThe process of installing only Cluster Systems Management (CSM) on the nodes, as opposed to a full installation, which involves installing both CSM and the operating system on the nodes.

cube adjusted weight (CAW)A weight measurement for items that have low weight with respect to the space they occupy.

cube groupA set of similar cubes where each cube group relates to a single level in one dimension of the model. Each member of the group is targeted at one of the categories in the level.

cube objectThe object in a model that corresponds to a cube. The cube object specifies how to build the cube and how to reflect the status once the cube has been built.

cube serverA high-performance, scalable cubing engine that is designed to support queries from many users against many different OLAP cubes.

cubic measurementThe volume calculation used to determine the amount of space required to store or ship material as well as the amount of space that can be accommodated by storage units or shipping modes. Used in capacity planning.

cullingIn GL, the process whereby a primitive that is smaller than the minimum size specified in the command is not rendered: no further commands in the primitive are interpreted.

cultural sortSorting of words or strings as a unit, rather than as individual characters. Cultural (or lexical) sort is the type used to order words in dictionaries, glossaries, indexes, and so on. See also sorting.

cumulative backup

A type of backup that includes the changes since the most recent full backup. The cumulative backup consolidates and replaces all previous differential backups.

cumulative functionA function that is used to model a quantity that varies over time and whose value depends on other decision variables of the problem. For example, a given capacity or physical resource can be modeled with a cumul function, and the cumulated contribution of intervals (activities) on the resource is represented by a function of time. cumulFunction is a CP keyword but is accepted as a CPLEX identifier.

cumulative mappingA form of BMS output mapping in which data stream generation is delayed until a SEND PAGE command is received or a page overflow occurs.

cumulative PTF packageMedia containing the program temporary fixes (PTFs) for i5/OS that have been accumulated from the start of the current release. PTFs requiring special handling are not included in a cumulative PTF package.

cumulative service tapeA tape that is sent with a new function order and that contains all current PTFs for that function.

cumulative timeThe time that a method spends on the execution stack, including both time spent in the method itself and in other methods that it calls.

cureIn printers, to dry ink sufficiently for minimum transfer of the ink to any parts of the printer it contacts.

cURLA command line tool for retrieving and posting files using URL syntax.

currencyFor an Ada-language compilation unit, the state where none of that unit's supporters has been recompiled since the unit itself was compiled. This implies that all of the supporters exist, since the Ada language requires this in order for the program to be compiled. Currency implies that all supporters of a unit were compiled in the correct order, as defined by Ada language rules.

currency conversion

A process used to configure conversion rates between the currencies used by organizations in their respective locales.

A factor that converts monetary values in a database from one country's monetary system into another without altering the original data.

currency definitionMechanism used to define a monetary symbol and indicate Euro currency membership and expiration date, if applicable.

currency formatAn alpha-numeric unique code of a currency.

currency partitionA dimension type that separates local currency members for a base currency defined in an application. A currency partition also identifies currency types such as actual, budget, and forecast.

currency recordInformation that is used in reporting components to display data in different currencies.

currency signIn COBOL, the character $.

currency symbol

In COBOL, the character defined by the CURRENCY SIGN clause in the SPECIAL-NAMES paragraph. If no CURRENCY SIGN clause is present in a COBOL source program, the currency symbol is identical to the currency sign.

A character such as the dollar sign ($) used to identify monetary values.

currency tableA table of information about currencies that the user maintains in Transformer or loads from an external data source.

currency timeThe time at which a user reads news items. The news command considers only the items posted after this time to be current for the user.

current backup versionIn DFSMShsm, a backup copy of the data set that was created on a date after the data set was last updated.

current baseline print coordinate (bc)In IPDS architecture, the baseline coordinate corresponding to the current print position on a logical page. The current baseline print coordinate is a coordinate in an I,B coordinate system.

current character positionThe two-dimensional screen coordinates where the next character string or pixel read/write operation will occur.

current chargeIn an advanced order, the set of charges a customer incurs for order items that can be shipped at once. See also total charge.

current colorThe color that is employed to color all subsequent drawing primitives. All drawing primitives are drawn with this color until it is changed.

current connect groupIn RACF, during a terminal session or batch job, the group with which a user is associated for access checking purposes. On MVS, if a user does not specify the current connect group on the LOGON command or batch JOB statement, the current connect group is the user's default group. On CICS, users cannot specify a group other than their default group. If list-of-groups processing is in effect, users are associated with all the groups to which they are connected. See also default group.

current customization definitionA customization definition that describes an instance for which the corresponding resources have already been deployed and are running.

current dataData within a host structure that is current with (that is, identical to) the data within the base table.

current inline presentation coordinateThe inline presentation position at the present time. This inline presentation position is the summation of the increments of all inline controls since the inline coordinate was established in the presentation space. An inline presentation position is established in a presentation space either as part of the initialization procedures for processing an object or by an Absolute Move Inline control sequence.

current inline print coordinateIn IPDS architecture, the inline coordinate corresponding to the current print position on a logical page. The current inline print coordinate is a coordinate in an I,B coordinate system.

current interrupted jobWhen a job is interrupted by pressing the Attn key, another job can be started from a command line. This job can also be interrupted by pressing the Attn key again. The current interrupted job is the most recently interrupted. The job name for the current interrupted job is displayed at the top of the Inquiry Options menu.

current inventoryItems currently available for shipment from a node.

current left marginIn DCF, the left limit of a column that is in effect for formatting.

current libraryThe library that is specified to be the first user library searched for objects requested by a user. The name for the current library can be specified on the Sign-On display or in a user profile. When you specify an object name (such as the name of a file or program) on a command, but do not specify a library name, the system searches the libraries in the system part of the library list, then searches the current library before searching the user part of the library list. The current library is also the library that the system uses when you create a new object, if you do not specify a library name.

current lineThe line on which the cursor is located.

current line pointer (CLP)In systems with time sharing, a pointer that indicates the display line on which operations are being performed.

current listA list name, specified with a resource definition online command, that is "remembered" until another list name is used.

current logical pageIn architecture, the logical page presentation space that is currently being used to process the data within a page object or an overlay object.

currently committedA state that increases the concurrency of read-only data access by allowing the committed version of a row to be processed when a lock is encountered instead of requiring the query to wait for the lock to be released. See also optimistic locking, pessimistic locking.

current modeIn the GDDM function, the characteristics of the controlling session. For example, when a color is defined, everything the program draws uses that color until the color is changed.

current objectThe application server to which the QMF session is currently connected. After the connection is made, this server processes all SQL statements.

current ownerIn Contributor, the person who is editing or last opened an e.List item for edit.

current pageAn open console page that is fully visible at a given moment or in focus. This is in contrast to other open pages that are in the background.

current planA detailed plan of system activity that covers a period of at least 1 minute, and not more than 21 days. A current plan typically covers 1 or 2 days.

current position

In computer graphics, the position, in user coordinates, that becomes the starting point for the next graphics routine, if that routine does not explicitly specify a starting point.

In architecture, the position identified by the current presentation space coordinates; for example, the coordinate position reached after the execution of a drawing order. See also given position.

In an IMS database, the place immediately preceding the segment occurrence that IMS retrieves if the user immediately issues an unqualified retrieval call.

current print position

The point on the page where the printer is currently logically positioned; the position were the next pel will be printed if no move text controls are executed. When the character is placed on the page, the character reference point coincides with the current print position. See also character reference point.

The picture element that defines the character reference point or the upper-left corner of an image.

current processor capacity (CPC)The amount of processor capacity (in units of 1/100 of a physical processor) that is assigned to a logical partition.

current record

The record pointed to by the current line pointer.

In COBOL, the record that is available in the record area associated with the file.

current record pointerIn COBOL, a method of identifying a record that is used in the sequential processing of the next record.

current releaseThe latest available release of the system that replaced the Licensed Internal Code, operating system, or both.

current rowThe most recently retrieved row of the active set of a query.

current security labelThe security label that RACF uses in RACF authorization checking if the SECLABEL class is active.

current selectionA highlighted text block or element.

current sessionIn CDE, the session saved by Session Manager when you log off. At the next login, unless you specify otherwise, this session automatically opens, enabling work to continue where you left off. See also home session.

current SQL IDIn DB2 for z/OS, an identifier that, at a single point in time, holds the privileges that are exercised when certain dynamic SQL statements run. The current SQL ID can be a primary authorization ID or a secondary authorization ID.

current stateIn DB2 for i5/OS, the state of a connection when it is the one used for SQL statements that are executed. See also dormant state.

current status rebuildThe second phase of restart processing during which the status of the subsystem is reconstructed from information on the log.

current versionThe latest checked-in version in the version series of a document. Only the current version can be checked out or promoted.

current volume pointerIn COBOL, a conceptual entity that points to the current volume of a sequential file.

current windowThe window to which the system directs the output from graphics routines.

curriculum architectA member of an education team who drives the delivery of educational offerings.

cursive scriptA script whose adjacent characters might touch or be connected to each other. For example, Arabic script is cursive.

cursor

A movable symbol on a display, often a blinking or solid block of light, that identifies a choice to select, indicates where user interaction with the keyboard will appear, or indicates a position of interest on the display surface.

In SQL, an identifier associated with a group of rows or with a collection.

During a HALDB online reorganization, a marker in a database partition that separates the copied database records from the records that have not been copied. The cursor indicates the progress of the reorganization through the HALDB partition.

A displayed symbol that acts as a marker to help the user locate a point in text, in a system command, or in storage. Cursors mark file position and access information in distributed data management (DDM) architecture.

cursor-active statusFor high availability large database (HALDB) online reorganization, the status in the recovery control data set (RECON data set) that alerts Database Recovery Control (DBRC) that an online reorganization has started.

cursor movement keyA key that a user presses to move the cursor on the screen.

cursor operation recordA record that contains instructions for the translator on moving through the result set returned by a query to a new record. Each operation record is associated with a single SQL statement record that returns a result set. The translator performs cursor operations as it encounters them while processing the map.

cursor sensitivityThe degree to which database updates made by the same application process or another application process are incorporated in the data returned by FETCH statements for a cursor after the database updates. See also asensitive cursor, cursor, insensitive cursor, sensitive cursor.

cursor stability (CS)

An isolation level under which a query in a transaction is prevented from reading any changes made to rows by statements in other transactions until the changes have been committed. A transaction using CS with an updatable cursor prevents statements in other transactions from changing and possibly reading a row until the cursor has moved from that row. See also isolation level, read stability, repeatable read, uncommitted read.

An isolation level that locks any row accessed by a transaction of an application while the cursor is positioned on the row. The lock remains in effect until the next row is fetched or the transaction is terminated. If any data is changed in a row, the lock is held until the change is committed to the database.

cursor table (CT)The internal representation of a cursor.

cursor variableA global variable, local variable, or parameter of a cursor data type.

An action for a file or project that is created using the Menu Manager preferences pages and is displayed on pop-up menus.

In JSP programming, an action described in a portable manner by a tag library descriptor and a collection of Java classes and imported into a JSP page by a taglib directive. (Sun)

An action on a business object that runs code for specific state transitions. This action can be a Java class method or an EJB name.

A Java or non-Java process definition that a user can define as a part of a health policy action plan or elasticity operation.

custom adapterAn adapter that is created by users or consultants and is not shipped with Sterling B2B Integrator. Custom adapters can integrate custom applications and legacy systems with Sterling B2B Integrator.

custom agentA user-specific or user-defined process that performs an action on behalf of a user or other program without user intervention or on a regular schedule, and reports the results back to the user or program.

custom attribute

User-defined characteristics of an asset, for example: support contact and confidential.

A user-defined property for an asset that further describes assets of that type. For example, a custom attribute for database tables might be "Expected maximum row count." The custom attribute would be available for every database table, and might contain different values for different database tables.

Custom-built Product Delivery Option (CBPDO)A software delivery package consisting of uninstalled products and unintegrated service. Installation requires the use of SMP/E. CBPDO is one of the two entitled methods for installing z/OS; the other method is ServerPac.

custom card identification number (CCIN)A unique alphanumeric number that is assigned many individual hardware parts or assemblies.

custom configurationA selected combination of products tailored by a vendor to the needs of one or more users. Each custom configuration is identified by unique serial number, which is incorporated into the custom configuration.

custom dashboardA dashboard that is created by the user from widgets and various data sources to meet specific requirements. It is not supplied with the application. See also fixed dashboard.

custom domainThe customized portion of the URL selected by the user to direct requests to the application. A custom domain makes up part of the route. A custom domain can be a shared domain, a shared subdomain, or a shared domain and host. See also domain, host, route, subdomain.

customer

A group or organization that is associated with one or more applications. A customer can be an external organization that accesses a data center or an internal department within a company.

A user of an online store.

customer acceptance laboratory (CAL)An environment set up to run with a perspective purchaser's sample data to ensure favorable performance.

customer accountCredit that is assigned to a customer by the corresponding enterprise.

customer analyticsA business process and a set of related technologies that help organizations analyze customer behavior, identity, and sentiment to make business decisions.

customer appeasementThe process of satisfying customers when they are displeased with any service provided.

customer assignmentThe assignment of pricing entities such as price lists, pricing rules, and coupons to customers so that the prices of items and pricing adjustments are applied to those customers.

customer baseThe primary market for a product or store.

customer churnThe proportion of contractual customers or subscribers who leave a supplier during a given time period. Churn rate is a possible indicator of customer dissatisfaction, cheaper and/or better offers from the competition, more successful sales and/or marketing by the competition, or reasons having to do with the customer life cycle. Churn rate can be thought of as the inverse of retention rate.

customer complianceThe tasks that must be performed to comply with a specific customer's needs, such as placing special labels on cartons that are shipped to a particular customer.

Customer ConsoleA user interface to a server.

customer engagementThe sum total of a customer's experiences with a company, brand, or other customers.

customer entitlementAn entitlement, defined by an enterprise, that defines the items that a customer can buy.

customer experienceA specific campaign (set of interactions) that a customer has with a company, brand, or other customers.

customer gradeA grade that is assigned to a customer, based on the customer's rating within the organization. For example, a customer may be assigned a grade of A, indicating that the customer is an excellent customer, or B, indicating that the customer is an average customer. These grades determine how approval rules for quotes can be applied.

customer groupA type of member group consisting of a collection of customers who have been grouped by a site administrator because they share similar shopping patterns or characteristics. See also site administrator.

customer impact event (CIE)An event that causes a customer to lose access to data, causes a customer to lose data, or causes an installation or repair to exceed the expected length of time.

customer installable feature (CIF)An assembly or part that a customer can replace.

customer lifetime value (CLV)A metric that can be used to predict the value of a complete future relationship with a customer.

customer orderA list of items being purchased by a customer. The customer order contains customer data, ship-to information, bill-to information, delivery dates, and line items that list SKUs being purchased.

customer pickThe process where a customer visits a store to pick up a product that has been previously ordered.

Customer Premise Equipment Alerting Signal tone (CAS tone)In ADSI, this tone is sent to the ADSI telephone to switch the phone to data mode.

customer premises equipment (CPE)Telephony equipment which is on the premises of a business or domestic customer of the telephone company. An example is a private branch exchange (PBX).

customer relationship management (CRM)One of two major corporate business processes (with Integrated Product Development) within IBM. CRM defines standards for responding to customers, particularly in the delivery of services engagements.

customer-replaceable unit (CRU)An assembly or part that a customer can replace.

custom error pageA feature of most web server software that allows the user to replace default error messages with messages that are custom designed for the application.

customer segmentAll information about the customer that is held by the seller. This can include basic demographics, order history, or operational data such as the user ID and shipping address. Customer segments are dynamic; marketing managers define the criteria for including a customer in a customer segment. Customer segments can be the targets of campaigns.

customer service optimizationThe practice of improving customer service operations, which is often measured by first call resolution rates, average call time, customer satisfaction with service, and other factors.

A defined role in WebSphere Commerce that manages customer inquiries. The customer service representative also processes customer registration, orders, and returns. See also customer service supervisor, script.

An IBM employee who assists a customer with aspects of service configuration.

customer service supervisorA defined role in WebSphere Commerce that has access to all customer service tasks. The customer service supervisor manages customer inquiries (such as customer registration, orders, returns, and auctions) and has authority to complete tasks that cannot be accessed by a customer service representative, such as approving system-denied returns records, and contacting customers regarding payment exceptions (such as credit card authorization failures). See also customer service representative.

customer session dataInformation gathered from customers during the time they visit an online store.

customer setup (CSU)The unpacking, setup, and checkout of machines by customer personnel, according to a sequence of instructions provided by the manufacturers, without the use of tools or the assistance of trained service personnel.

customer typeAn identifying type for a customer, such as a business customer or a consumer customer.

customer valueThe relative worth, utility or importance of a given requirement or solution to customers.

customer verticalThe sector to which a customer belongs, such as educational institutions or government.

custom eventAn event that is customized by a buyer or a seller to monitor the lifecycle events of a purchase order that is not preconfigured in the solution.

custom fieldA field in a user or group profile that can be used to store installation data, and for which the installation can customize the keyword name and attributes.

An advanced XML condition that supplements the set of defined functions that are provided in the Greex library and are used to evaluate conditions on input data.

An advanced XML condition that is configurable to meet specific validation scenarios.

custom groupA group that is used to organize report objects in a report according to their purpose or content. All other report objects are filtered out if they are not assigned to the custom group.

customization

The modification of a portal page or portlet by a user. WebSphere Portal enables a user to customize a portal page by modifying the page layout and by selecting which portlets will display per device. See also personalization.

The process of describing optional changes to defaults of a software program that is already installed on the system and configured so that it can be used. See also configuration.

The ability to change how objects on a personal computer look and work. For example, a user can tailor what objects are in a work area by creating, moving, or copying objects to the work area.

The process of designing a data processing installation or network to meet the requirements of particular users. Activities can include installing additional products, taking advantage of new software features and functions, and enabling or disabling optional features.

customization definition document (CDD)An XML document that describes the layout of an instance (that is, its organizational units (OUs) and servers, and which service bundles are assigned to each server-OU combination). The Customization Definition Program (CDP) uses a CDD to determine which deployment data to produce for an instance.

customization definition reportA report that describes the servers, organizational units (OUs), and services of an instance, and how they are distributed within the instance.

customization modeOne of two modes in which the IBM Watson system can be run. The system can be run in customization mode when the annotators, services, and components that make up the system are being adapted for a new domain or data set. See also production mode.

customize

To describe optional preferences or changes to defaults in a software program that is already installed and configured.

To describe to the system the devices, programs, users, and user defaults for a particular data processing system or network.

customized databaseAn entity within the Object Data Manager (ODM) that contains configuration data for defined or available devices in the system.

Customized Devices Object ClassA representation within the Object Data Manager (ODM) of each device instance as distinguished by a unique logical name. The Customized Devices Object Class contains basic information about the device such as device status and how to access the information contained in other object classes.

customized installation package (CIP)A customized installation image that can include one or more maintenance packages, a configuration archive file from a stand-alone server profile, one or more enterprise archive files, scripts, and other files that help customize the resulting installation.

customizerA Java class (implementing the java.beans.Customizer interface) that is associated with a bean to provide a richer user interface for the properties of that bean.

custom mail file templateA Notes mail template that is used to apply a customized design to the mail file.

custom nodeA virtual image part that provides an unconfigured node for a pattern that has a deployment manager or a control node as its base.

custom objectA generic business object that can be stored in a folder. A custom object cannot have versions, lifecycles, or content.

custom profileA profile that describes an empty node, which becomes operational, as a managed node, when federated into a network deployment cell.

custom property

A property that consists of a name and value and applies to an organization, product, or contract for informational and search purposes.

A user-defined property, as opposed to a system-defined property. The user can assign custom properties to a class. See also property.

custom relationshipAn association between two or more data entities as provided by the user.

custom resourceA resource that is created by a console administrator and can be customized and deleted. See also resource type.

custom screen recordA runtime view of the screen that allows access to available screen fields.

custom serverA C language or C++ language program that provides data manipulation and local or remote data stream, database, or other services beyond those provided by the state table interface. Custom servers provide an interface between DirectTalk and business applications, functions, or other processes to give callers access to business information and voice processing functions such as speech recognition. See also 3270 server.

custom serviceA configurable service that defines a hook that runs when the server starts and shuts down when the server stops.

custom setIn Analysis Studio, a named object which can include filter rules, calculations, and sort rules. Custom sets can define a set of members that is different from any set originally defined in the cube model. See also predefined set, set.

custom tableAn object on the Guardium system that relates one or more attributes from uploaded tables together.

custom tagAn extension to the JavaServer Pages (JSP) language that performs a specialized task. Custom tags are typically distributed in the form of a tag library, which also contains the Java classes that implement the tags.

custom text analysis engineA text analysis engine that is created using the Unstructured Information Management Architecture (UIMA) SDK and can be added to the set of standard enterprise search text analysis engines. See also analysis engine, enterprise search base annotator.

custom toolA type of script that is used to create customized applications, user interfaces, and updates the menu structure of the user interface.

custom userA user type that has the same permissions of a standard user plus the ability to create projects, archive data, partition data, create groups, create users, or manage the database.

custom user registryA customer-implemented user registry that implements the UserRegistry Java interface. This registry type can support virtually any kind of accounts repository from a relational database and can provide flexibility in adapting product security to various environments.

custom viewA view that uses actions such as summarize, cloak, exclude, and apex to limit access to information in a cube to members of a given user class. User class views are replaced by custom views associated with the users, groups, or roles in a configured namespace.

custom volumeA volume in count-key-data (CKD) format that is not a standard volume, which means that it does not necessarily present the same number of cylinders and capacity to its assigned logical control unit as provided by one of the standard S/390 volume types. See also count key data, interleave, standard volume.

Custom Wire Format (CWF)The physical representation of a message in the MRM domain that is composed of a number of fixed format data structures or elements, which are not separated by delimiter characters.

cut

In multimedia applications, the process of instantly replacing a picture from one source with a picture from another. This is the most common form of editing scene to scene.

A way of eliminating part of the search space without losing any feasible or optimal solutions.

The severed part of a perforation. Cuts are separated by ties.

An action that identifies a page, object, or picture that is to be deleted or moved to another place in the same or different document or file

cut and pasteA type of dictionary gloss used to restore the lemma form the surface form by cutting and pasting new characters.

cut-down modelA customized copy of the master model definition that has been cut down to include only the specific elements required for a particular e.List item.

cut formA single form not connected to other forms. The form may have an original and one or more copies. Cut forms are fed separately into a printer. See also continuous forms.

cut-throughIn fibre-channel technology, a switching technique that allows a routing decision to be made and acted upon as soon as the destination address of a frame is received. See also route.

cut-through channelA channel of voice data which has been passed through echo cancellation algorithms. The channel provides echo-cancelled voice data which can then be used by the engine in a recognition attempt.

cut-to-tie ratioThe ratio of the length of the cut and the length of the tie in the perforations between continuous forms.

cyan/magenta/yellowA color model used by the printing industry based on mixing cyan, magenta, and yellow. See also cyan/magenta/yellow/black.

cyan/magenta/yellow/blackA color model used by the printing industry based on mixing cyan, magenta, yellow, and black. CMYK is an enhancement of the cyan/magenta/yellow (CMY) model, created after printers discovered they could obtain a darker black using special black colorants rather than by combining cyan, magenta, and yellow alone. See also cyan/magenta/yellow.

cybersecurityThe protection of online information from attack or unauthorized use.

cycle

To end a management collection object that is currently in use and to open a new object for storing future collections. This process prevents collection objects from becoming too large.

A set of tables that can be ordered so that each table is a descendent of the one before it, and the first table is a descendent of the last table. A self-referencing table is a cycle with a single member. See also referential cycle.

cycle countThe process of counting items in storage and reconciling the actual count (resolving count variances) to system inventory records.

The time required for a process instance in a process simulation run to finish processing its inputs. Cycle time includes idle time when an activity in the process is waiting for a resource to become available.

The minimum time interval between starts of successive read/write cycles of a storage device.

The time elapsed during one cycle of the processor. Cycle time varies from one type of processor to another.

cyclic arrayAn array whose elements are organized as a linked chain.

cyclic intervalThe number of days in a cyclic period.

cyclic periodA period that represents a constant number of days. There are two types of cyclic periods: Work-days-only cyclic period, where only the work days are counted when calculating the number of days in the period and All-days cyclic period, where all days are counted.

cyclic redundancy check (CRC)

A system of error checking performed at both the sending and receiving station after a block-check character has been accumulated.

A redundancy check in which the check key is generated by a cyclic algorithm

cylinder

On a magnetic disk or in an assembly of disks, the set of all tracks that can be accessed by all the magnetic heads of a comb in a given position, without repositioning the access mechanism.

A unit of storage on a count-key-data (CKD) device with a fixed number of tracks.